VMware!SDDC!Product! Applicability!Guide!for! FedRAMP,!v!1.0! February,!2014! v1.0!

Size: px
Start display at page:

Download "VMware!SDDC!Product! Applicability!Guide!for! FedRAMP,!v!1.0! February,!2014! v1.0!"

Transcription

1 VMWAREPRODUCTAVAILABILITY GUIDEFORFEDRAMP VMwareSDDCProduct ApplicabilityGuidefor FedRAMP,v1.0 February,2014 v1.0 TECHNICALGUIDE This is the first document in the Compliance Reference Architecture for FedRAMP. You can find more information on the Framework and download the additional documents from the VMware FedRAMP Compliance Resources on VMware Solution Exchange.

2 VMWAREPRODUCTAPPLICABILITYGUIDEFORFEDRAMP TableofContents EXECUTIVESUMMARY...3 INTRODUCTION...4 OFFICIALFEDRAMPGUIDANCEASITAPPLIESTOCLOUDENVIRONMENTS...6 CLOUDCOMPUTING...10 WHERETOSTARTBCONSIDERATIONSFORSYSTEMOWNERS,ITANDASSESSORS...12 VMWAREPRODUCTSANDFEDRAMP...14 VMWAREFEDRAMPREQUIREMENTSMATRIX(OVERVIEW)...16 FEDRAMPREQUIREMENTSMATRIX(BYVMWARESUITE)...18 VCLOUDSUITE VCLOUDNETWORKINGANDSECURITYSUITE VCENTEROPERATIONSMANAGEMENTSUITE VMWARENSXSUITE DESIGNGUIDE/ 2

3 VMWAREPRODUCTAPPLICABILITYGUIDEFORFEDRAMP ExecutiveSummary TheFederalRiskAuthorizationandManagementProgram(FedRAMP)wascreatedtoprovideastreamlinedand standardizedprocessalongwitha doonce,usemanytimes approachtotheauthorizationofcommercialcloudservices. ThisprogramenablesUSGovernmentagenciestotakefulladvantageofthebenefitsofmigratingtheirITassetsand infrastructuretothecloud,astheyworktomeetthegoalsofthefederalcloudcomputingstrategypublishedbythewhite HouseinFebruary2011.FedRAMP,whichisgovernedbyaJointAuthorizationBoard(JAB)thatconsistsof representativesfromthedepartmentofhomelandsecurity(dhs),thegeneralservicesadministration(gsa),andthe DepartmentofDefense(DoD)isalsoendorsedbytheU.S.government sciocouncilincludingtheinformationsecurity andidentitymanagementcommittee(isimc). TheFedRAMPprogramprovidesanavenueforCloudServiceProviders(CSPs)toobtainaprovisionalAuthorizationTo Operate(p`ATO)afterundergoinganindependentthird`partysecurityassessmentthathasbeenreviewedbytheJAB.By assessingsecuritycontrolsoncandidateplatforms,andprovidingp`atosonplatformsthathaveacceptablerisk, FedRAMPsignificantlyreducesthetimeandcosttoagenciesbyremovingtheassessmentandauthorizationrequirements oftheunderlyingcloudvendorservicesonasystem`by`systembasis.thisminimizestheworkeachconsumerof FedRAMPCloudresourcesmustundergotoreceiveanactualATOfortheworkloadsrunningapplicationsthatprocess sensitivedataandtransactions. VMware,theleaderincloudcomputingsoftwareforenterprisesandcloudhostingserviceprovidersalike,recognizesthe tremendousopportunitythatfedrampprovidescustomerswishingtoleveragevmwarevcloud`poweredfedramp environmentsforhostingtheirenterpriseapplications.foranentitywishingtohostapplicationsinafedramp`accredited VMwarevCloudhostingprovider,orforthevCloudhostingprovideritself,itisbeneficialtounderstandwhichfeaturesof thevmwarestackmayapplyingainingandmaintainingfedrampcompliance.inadditiontovmwareproductsandsuites VMwaresTechnologyPartnerssolutionsmayalsobeusedtoprovidethisgoalofongoingFedRAMPaccreditationwith thegreatestsecurity,agilityandcostsavings. ForthesereasonsVMwarehasenlisteditsAuditPartnerssuchasCoalfire,aFedRAMP`approved3rdPartyAssessment Organization(3PAO),toengageinaprogrammaticapproachtoevaluateVMwareproductsandsolutionsforFedRAMP controlcapabilitiesandthentodocumentthesecapabilitiesintoasetofreferencearchitecturedocuments.thefirstof thesedocumentsinthefedrampreferencearchitecturesetisthisdocument,theproductapplicabilityguide,which containsamappingofthevmwareproductsandfeaturesthatshouldbeconsideredforimplementingfedrampcontrols. ThenexttwodocumentsintheFedRAMPReferenceArchitectureset,theArchitectureDesignGuideandtheValidated ReferenceArchitecture,willprovideguidanceonthekeyconsiderationsfordesigningavCloudenvironmentforFedRAMP, aswellasalabvalidationexerciseanalyzinganinstanceofthisreferencearchitecturewhichutilizestheconceptsand approachesoutlinedtherein. Inaddition,VMwareandCoalfireareengagedwithVMwareTechnologyPartnerstoanalyzetheirproductsandsolutions (availableonvmwaresolutionexchange)withthegoalofprovidingcontinuingexamplestotheindustry.inanongoing effort,vmwareandcoalfirewillutilizethisinformationtocreatenew"joint"referencearchitecturesbasedonthevmware ReferenceArchitectureforFedRAMPwherepartnerproductsandsolutionsarecombinedandlabvalidatedtofurtherease adoptionforcio s,itmanagers,architects,itauditorsandsecuritypractitionersinvolvedwithavmwarevcloudsuite5.5 basedcloudcomputingarchitecture.seefigure3inthisdocumentforthecompliancesolutioncategories. ThisstudyinvestigateddifferentVMwareapplicationsavailabletoorganizationsthatuse(orareconsideringusing) virtualizationandcloudtosupportafedrampcompliantenvironment.tothatend,coalfirehighlightedthespecific FedRAMPrequirementstheseapplications(partially)addressorshouldbeconsideredinanevaluationoftheinitial sourcingoftechnologiestobuildafedrampcompliantenvironment.thecontrolsselectedfor[?]thispaperarefromthe DESIGNGUIDE/ 3

4 VMWAREPRODUCTAPPLICABILITYGUIDEFORFEDRAMP NISTSP800`53Rev3andtheFedRAMPSecurityControlsBaselinev1.1.Ithasbeenreviewedandauthoredbyourstaff offedrampauditorsinconjunctionwithvmware. Introduction Complianceandsecuritycontinuetobetopconcernsfororganizationsthatplantomoveanyoralloftheirenterprise` computingenvironmenttothecloud.vmwarehelpsorganizationsaddressthesechallengesbyprovidingbundled solutions(suites)thataredesignedforspecificusecases.theseusecasesaddressquestionslike HowcanIbe FedRAMPcompliantinaVMwaresupportedvCloudhostingenvironment? byprovidinghelpfulinformationforvmware architects,thecompliancecommunity,andthirdparties. TheFedRAMPcompliantPublicCloudUseCase(SeesectiononCloudComputinginthisdocumentforCloudUseCases) isfocusedonthevcloudserviceproviderintendingtooperateafedrampcompliantpubliccloud.duetothenatureof thepubliccloudusecasethisdocumentisprimarilyconcernedwithguidingreadersintheassemblyofvmware componentswithintheproviderlayer.thislayeriscomprisedoffourvmwareproductsuites`vcloud,vcloudnetworking andsecurity(vcns),vcenteroperations(vcops)andnsx.theseproductsuitesaredescribedindetailinthispaper andintheaforementionedsubsequentcompaniondocuments.theusecasealsoprovidesreaderswithamappingofthe specificfedrampcontrolstovmware sproductsuite,partnersolutions,andorganizationsinvolvedinfedramp compliantcloudservices.whileeverycloudisunique,vmwareanditspartnerscanprovideasolutionthataddressesover 19%ofFedRAMPModeraterequirementswith70%?TBDofcoverageamongtechnicalandoperationalcontrols. FedRAMPisbasedontheNISTSP800`53Rev3setofcontrols(notethatRev4ofthesecontrolsiscurrentlyavailablebut withoutcorrespondingfedrampguidance).whilethisdocumentisintendedtoprovideguidancesolelywithinthepublic CloudUseCaseitcanalsobebeneficialtothosewhoseekguidanceonbuildingaFISMAModerate(NISTSP800`53 Rev3)PrivateCloudenvironment.AnotherversionoftheReferenceArchitecturewrittenspecificallyfortheFISMA ModeratePrivateCloudUseCaseisexpectedtobereleasedlaterin2014. DuetothecommonalitiesoftheVMwareproductsandfeaturesacrossalloftheCloudUseCases,understandingtheir relationshiptotheseventeenfedrampcontrolareasisfundamentalandmostbroadlyaccommodatedinthisdocument with more Use Case specific guidance represented in the Architecture Design Guide. Regardless of the Use Case or operating environment model the FedRAMP control areas represent a broad`based, balanced, information security program that addresses the management, operational, and technical aspects of protecting federal information and information systems. The management, operational, and technical controls (i.e., safeguards or countermeasures) are prescribedforaninformationsysteminordertoprotecttheconfidentiality,integrity,andavailabilityofthesystemandits information.theoperationalsecuritycontrolsareimplementedandexecutedprimarilybypeople(asopposedtosystems). The management controls focus on the management of risk and the management of information system security. The technical security controls are implemented and executed primarily by the information system through mechanisms containedinthehardware,software,orfirmwarecomponentsofthesystem. Acomprehensiveassessmentofthemanagement,operationalandtechnicalcontrolsthathavebeenselectedforthe informationsystem isrequiredaspartoftheauthorizationprocess.thisassessmentmustdeterminetheextenttowhich allselectedcontrolsareimplementedcorrectly,operatingasintended,andproducingdesiredoutcomeswithrespectto meetingthesecurityrequirementsforthesystem.anunderstandingofbothfismamoderateandfedrampcontrolsas implementedwithvmwareanditstechnologypartnerssolutionslendsitselftoharmonizingtheongoingcomplianceofthe privatecloudenvironmentbutalsothesharedresponsibilityforcomplianceinthepubliccloudenvironment.thiscommon setofwell`understoodpoliciesandproceduresimplementedinacommonvmwaresoftwaredefineddatacenter architecturesacrossprivateandpubliccloudenablesnotonlythehybridcloudtobecomerealitybutopensup tremendousopportunitiesfortightercontrolandagilitywithregardtotheprinciplesputforthinthecontinuousdiagnostics DESIGNGUIDE/ 4

5 VMWAREPRODUCTAPPLICABILITYGUIDEFORFEDRAMP andmitigationprogramasoutlinedbydepartmentofhomelandsecurityandcoveredinsection#neednumbered SECTIONSinthisdocument. Figure1FedRAMPRequirementsandVMware(neednewGraphicwithNISTCAPS) Figure2:FedRAMPRequirementsandApplicableControlFamilies Controls AccessControl Auditand Accountability Configuration Management Systemand Communication Protection Operationaland TechnicalFedRAMP DESIGNGUIDE/ 5

6 VMWAREPRODUCTAPPLICABILITYGUIDEFORFEDRAMP Figure3:VMware+PartnerProductCapabilitiesforaTrustedCloud OfficialFedRAMPGuidanceasitappliestoCloud environments TheFederalRiskAuthorizationManagementProgram(FedRAMP)istheresultofclosecollaborationwithcybersecurity andcloudexpertsfromgsa,nist,dhs,dod,nsa,omb,thefederalciocouncilanditsworkinggroups,aswellas privateindustry.thegoalistoprovideastreamlinedprocessforthesecurityassessmentandauthorizationofcommercial cloudservices.thisprocessallowsasingleprovisionalauthorization(p`ato)ofthecloudserviceofferingtobeleveraged byanyfederalagencywithoutrequiringthemtore`assessthehostinginfrastructureonaper`systembasis. CSPsmustimplementtheFedRAMPsecurityrequirementsintheirenvironmentandhireaFedRAMP`approvedthirdparty assessmentorganization(3pao)toperformanindependentassessmenttoauditthecloudsystemandprovideasecurity assessmentpackageforreview.inordertomaintainaprovisionalauthorizationthecloudserviceprovidermust implementacontinuousmonitoringprogram.thisiscriticaltoensuringthesecuritycontrolsoutlinedinthenistsp800` 53Rev3baselineandtheadditionalFedRAMPparametersareeffectivelyimplemented. TheFedRAMPsecuritycontrolsbaselineisbasedontheNISTSP800`53Rev3controlsthatprovidedetailed Management,OperationalandTechnicalcontrolguidanceformeetingthesecurityrequirementsestablishedbyFederal InformationSystemManagementAct(FISMA).InadditiontotheFISMAcompliancerequirementsoutlinedintheNIST controlsbaseline,fedramprequirementshavebeenwrittenforkeycontrolsandcontrolenhancements. Table1:FedRAMPControlsBaseline DESIGNGUIDE/ 6

7 VMWAREPRODUCTAPPLICABILITYGUIDEFORFEDRAMP NIST800B53rev3 ControlFamily Identifiers NIST800B53rev3 ControlFamily Class FedRAMPModerate Baseline AC AccessControl Technical 17(24) AT AwarenessandTraining Operational 4 AU AuditandAccountability Technical 12(9) CA Certification,Accreditation, andsecurityassessment Management 6(2) CM ConfigurationManagement Operational 9(12) CP ContingencyPlanning Operational 9(15) IA Identificationand Authentication Technical 8(10) IR IncidentResponse Operational 8(4) MA Maintenance Operational 6(6) MP MediaProtection Operational 6(5) PE Physicaland EnvironmentalProtection Operational 18(5) PL Planning Management 5 PS PersonnelSecurity Operational 8 RA RiskAssessment Management 4(5) SA SystemandServices Acquisition Management 12(7) SC Systemand Communications Protection Technical 24(16) SystemandInformation Integrity Operational 12(9) SI EThenumberinparenthesesinthelastcolumnincludesthecontrolenhancementsrequiredbythe FedRAMPModerateBaseline ForCloudServiceProviders,deployingandmaintaininganinfrastructurethatmeetstherequirementsestablishedinthe NISTandFedRAMPbaselinerequirescentralizedmanagementandcontrolofallcomponentsincludingvirtual applications,platforms,andnetworkdevices. TheFederalRiskAuthorizationManagementProgram(FedRAMP)specificallybeganprovidingformalizedguidancefor cloudandvirtualenvironmentsinjune,2012.theseguidelineswerebasedonindustryfeedback,rapidadoptionof virtualizationtechnology,andthemovetocloud. Figure4:OfficialguidanceonsecurityinFedRAMPCloudenvironments DESIGNGUIDE/ 7

8 VMWAREPRODUCTAPPLICABILITYGUIDEFORFEDRAMP NIST800B53 TheobjectiveofNISTSpecialPublication800`53istoprovideasetofsecuritycontrolsthatcansatisfythebreadthand depth of security requirements levied on information systems and organizations and that is consistent with and complementarytootherestablishedinformationsecuritystandards. ThecatalogofsecuritycontrolsprovidedinSpecialPublication800`53canbeeffectivelyusedtodemonstratecompliance withavarietyofgovernmental,organizational,orinstitutionalsecurityrequirements.itistheresponsibilityoforganizations toselecttheappropriatesecuritycontrols,toimplementthecontrolscorrectly,andtodemonstratetheeffectivenessofthe controlsinsatisfyingtheirstatedsecurityrequirements.thesecuritycontrolsinthecatalogfacilitatethedevelopmentof assessmentmethodsandproceduresthatcanbeusedtodemonstratecontroleffectivenessinaconsistentandrepeatable manner thus contributing to the organization s confidence that there is ongoing compliance with its stated security requirements. TheNIST800`53presentsthefundamentalconceptsassociatedwithsecuritycontrolselectionandspecificationincluding: (i)thestructureofsecuritycontrolsandtheorganizationofthecontrolsinthecontrolcatalogn(ii)securitycontrolbaselinesn (iii) the identification and use of common security controlsn (iv) security controls in external environmentsn (v) security controlassurancenand(vi)futurerevisionstothesecuritycontrols,thecontrolcatalog,andbaselinecontrols. Security controls described in this publication have a well`defined organization and structure. For ease of use in the security control selection and specification process, controls are organized into eighteen families. Each security control family contains security controls related to the security functionality of the family. In addition, there are three general classesofsecuritycontrols:management,operational,andtechnical. FedRAMP CloudcomputingtechnologyallowstheFederalGovernmenttoaddressdemandfromcitizensforbetter,fasterservices andtosaveresources,consolidateservices,andimprovesecurity.theessentialcharacteristicsofcloudcomputing``on` demandprovisioning,resourcepooling,elasticity,networkaccess,andmeasuredservices``providethecapabilitiesfor agenciestodramaticallyreduceprocurementandoperatingcostsandgreatlyincreasetheefficiencyandeffectivenessof services. Agencieshaverealizedthebenefitsofthistechnologyandareintegratingitintotheirinformationtechnologyenvironment. OnDecember9,2010ntheOfficeofManagementandBudget(OMB)releasedthe25PointImplementationPlantoReform FederalInformationTechnologyManagement,establishingtheCloudFirstpolicyandrequiringagenciestousecloud` basedsolutionswheneverasecure,reliable,cost`effectivecloudoptionexists.thefederalriskandauthorization ManagementProgram(FedRAMP)wasestablishedbyamemorandumissuedbyOMBonDecember8,2011,Security AuthorizationofInformationSystemsinCloudComputingEnvironments(FedRAMPPolicyMemo)toprovideacost` effective,risk`basedapproachfortheadoptionanduseofcloudservices.akeyelementtosuccessfulimplementationof cloudcomputingisasecurityprogramthataddressesthespecificcharacteristicsofcloudcomputingandprovidesthelevel ofsecuritycommensuratewithspecificneedstoprotectgovernmentinformation.effectivesecuritymanagementmustbe basedonriskmanagementandnotonlyoncompliance.byadheringtoastandardizedsetofprocesses,procedures,and controls,agenciescanidentifyandassessrisksanddevelopstrategiestomitigatethem. ThepurposeofFedRAMPisto: Ensurethatcloudbasedserviceshaveadequateinformationsecurityn Eliminateduplicationofeffortandreduceriskmanagementcostsnand Enablerapidandcost`effectiveprocurementofinformationsystems/servicesforFederalagencies. FedRAMPwasdevelopedincollaborationwiththeNationalInstituteofStandardsandTechnology(NIST),theGeneral ServicesAdministration(GSA),theDepartmentofDefense(DOD),andtheDepartmentofHomelandSecurity(DHS). Manyothergovernmentagenciesandworkinggroupsparticipatedinreviewingandstandardizingthecontrols,policiesand procedures. DESIGNGUIDE/ 8

9 VMWAREPRODUCTAPPLICABILITYGUIDEFORFEDRAMP ThemajorparticipantsintheFedRAMPprocessare: Federalagencycustomer hasarequirementforcloudtechnologythatwillbedeployedintoitssecurity environmentandisresponsibleforensuringfedrampcompliance CloudServiceProvider(CSP) iswillingandabletofulfillagencyrequirementsandtomeetsecurityrequirements JointAuthorizationBoard(JAB) reviewsthesecuritypackagesubmittedbythecspandgrantsaprovisional AuthoritytoOperate(ATO) 3rdPartyAssessorOrganization(3PAO) validatesandatteststothequalityandcomplianceofthecspprovided securitypackage FedRAMPProgramManagementOffice(PMO) managestheprocessassessment,authorization,and continuousmonitoringprocess ACSPfollowstheprocessforaprovisionalauthorizationunderFedRAMPandusesa3PAOtoassessandreviewits securitycontrolimplementations.cspsthenprovidedocumentationofthetestresultsinacompletedassessmentpackage tothefedramppmo.thesecuritypackageisthenreviewedbythejabandifacspsystempresentsanacceptable levelofrisk,aprovisionalauthorizationisgranted.agenciescanthenleveragetheprovisionalatoandgranttheirown ATOwithoutconductingduplicativeassessments. FedRAMPContinuousMonitoringStrategy&Guide FedRAMP assessment process requires that monitoring activities be conducted continuously, quarterly, annually, every three years and every five years. These activities include required activities from the CSP and required activities of a 3PAO.ThecontinuousmonitoringprogramunderFedRAMPisdesignedtoprovidemoretransparencyintotheongoing securitypostureoftheauthorizedcloudenvironmentorserviceenvironmentisacceptable. TheOMBmemorandumM`10`15,issuedonApril21,2010,changedfromstaticpoint`in`timesecurityauthorization processestoongoingassessmentandauthorizationthroughoutthesystemdevelopmentlifecycle.consistentwiththis newdirectionfavoredbyombandsupportedinnistguidelines,fedramphasdevelopedanongoingassessmentand authorizationprogram ContinuousMonitoringStrategy&Guide forthepurposeofreauthorizingcloudserviceproviders (CSP)annually.Traditionally,thisprocesshasbeenreferredtoas ContinuousMonitoring asnotedinnistsp800`137 InformationSecurityContinuousMonitoringforFederalInformationSystemsandOrganizations.OtherNISTdocuments suchasnistsp800`37,revision1referto ongoingassessmentofsecuritycontrols.itisimportanttonotethatboththe terms ContinuousMonitoring and OngoingSecurityAssessments meanessentiallythesamethingandshouldbe interpretedassuch. Monitoringsecuritycontrolsispartoftheoverallriskmanagementframeworkforinformationsecurityandisarequirement forcspstomaintaintheirfedrampprovisionalauthorization.afterasystemreceivesafedrampprovisional Authorization,itispossiblethatthesecuritypostureofthesystemcouldchangeovertimeduetochangesinthehardware orsoftwareonthecloudserviceoffering,oralsoduetothediscoveryandprovocationofnewexploits.performingongoing securityassessmentsdetermineswhetherthesetofdeployedsecuritycontrolsinaninformationsystemremainseffective inlightofnewexploitsandattacks,andplannedandunplannedchangesthatoccurinthesystemanditsenvironmentover time.ongoingassessmentandauthorizationprovidesfederalagenciesusingcloudservicesamethodofdetecting changestothesecuritypostureofasystemforthepurposeofmakingrisk`baseddecisions..ongoingduediligenceand reviewofsecuritycontrolsenablesthesecurityauthorizationpackagetoremaincurrentwhichallowsagenciestomake informedriskmanagementdecisionsastheyusecloudservices.toreceivereauthorizationofafedrampprovisional Authorizationfromyeartoyear,CSPsmustmonitortheirsecuritycontrols,assessthemonaregularbasis,and demonstratethatthesecuritypostureoftheirserviceofferingiscontinuouslyacceptable. FedRAMPContinuousMonitoringStrategy&GuideisintendedtoprovideCSPswithguidanceandinstructionsonhowto implementtheircontinuousmonitoringprogram.certaindeliverablesandartifactsrelatedtocontinuousmonitoringthat FedRAMPrequiresfromCSP sarediscussedinthisdocument. DESIGNGUIDE/ 9

10 VMWAREPRODUCTAPPLICABILITYGUIDEFORFEDRAMP CloudComputing Cloudcomputingandvirtualizationhavecontinuedtogrowsignificantlyeveryyear.Thereisarushtomoveapplications andevenwholedatacenterstothe cloud,althoughfewpeoplecansuccinctlydefinetheterm cloudcomputing. There areavarietyofdifferentframeworksavailabletodefinethecloud,andtheirdefinitionsareimportantastheyserveasthe basisformakingbusiness,security,andauditdeterminations.vmwaredefinescloudorutilitycomputingasthefollowing ( CloudcomputingisanapproachtocomputingthatleveragestheefficientpoolingofonPdemand,selfPmanagedvirtual infrastructure,consumedasaservice.sometimesknownasutilitycomputing,cloudsprovideasetoftypicallyvirtualized computerswhichcanprovideuserswiththeabilitytostartandstopserversorusecomputecyclesonlywhenneeded, oftenpayingonlyuponusage.. Figure5:CloudComputing Therearecommonlyaccepteddefinitionsforthecloudcomputingdeploymentmodelsandthereareseveralgenerally acceptedservicemodels.thesedefinitionsarelistedbelow: PrivateCloud Thecloudinfrastructureisoperatedsolelyforanorganizationandmaybemanagedbythe organizationorathirdparty.thecloudinfrastructuremaybeonpremiseoroff`premise. PublicCloud Thecloudinfrastructureismadeavailabletothegeneralpublicortoalargeindustrygroup andisownedbyanorganizationthatsellscloudservices. HybridCloud Thecloudinfrastructureisacompositionoftwoormoreclouds(privateandpublic)that remainuniqueentities,butareboundtogetherbystandardizedtechnology.thisenablesdataandapplication DESIGNGUIDE/ 10

11 VMWAREPRODUCTAPPLICABILITYGUIDEFORFEDRAMP portabilitynforexample,cloudburstingforloadbalancingbetweenclouds.withahybridcloud,an organizationgetsthebestofbothworlds,gainingtheabilitytoburstintothepubliccloudwhenneededwhile maintainingcriticalassetsonpremise. CommunityCloud Thecloudinfrastructureissharedbyseveralorganizationsandsupportsaspecific communitythathassharedconcerns(forexample,mission,securityrequirements,policy,andcompliance considerations).itmaybemanagedbytheorganizationsorathirdparty,andmayexistonpremiseoroff premise. TolearnmoreaboutVMware sapproachtocloudcomputing,reviewthefollowing: VMwareCloudComputingOverview VMware svcloudarchitecturetoolkit Whenanorganizationisconsideringthepotentialimpactofcloudcomputingtoitshighlyregulatedandcriticalapplications, itmaywanttostartbyasking: Isthearchitectureatruecloudenvironment(doesitmeetthedefinitionofcloud)? Whatservicemodelisusedforthecardholderdataenvironment(SaaS,PaaS,IaaS)? Whatdeploymentmodelwillbeadopted? Isthecloudplatformatrustedplatform? ThelastpointiscriticalwhenconsideringmovinghighlyregulatedapplicationstoacloudplatformFedRAMPdoesnot endorseorprohibitanyspecificserviceanddeploymentmodel.theappropriatechoiceofserviceanddeploymentmodels shouldbedrivenbycustomerrequirements,andthecustomer schoiceshouldincludeacloudsolutionthatisimplemented usingatrustedplatform. VMwareisthemarketleaderinvirtualization,thekeyenablingtechnologyforcloudcomputing.VMware svcloudsuite5.5 isthetrustedcloudplatformthatcustomersusetorealizethemanybenefitsofcloudcomputingincludingsafelydeploying businesscriticalapplications. IfyouareanorganizationorpartnerthatisinterestedinmoreinformationontheVMwareComplianceProgram,please DESIGNGUIDE/ 11

12 VMWAREPRODUCTAPPLICABILITYGUIDEFORFEDRAMP WheretoStartBConsiderationsforSystemOwners,ITand Assessors MigratingatraditionalITinfrastructuretoavirtualorcloudenvironmenthasasignificantimpactonanorganizationthat extendsbeyondinformationtechnology.securityandcompliancecontinuetoremaintopconcernsformanagement,it departments,andauditors.allthreeareasshouldberepresentedandengagedforanyitvirtualizationorcloudprojectsto confirmthatbusiness,itoperations,andcomplianceteamscarefullyconsiderthebenefitsandrisks. Thefollowingquestionsmaybeimportantwhenconsideringthepotentialbusinessimpact,benefits,andrisksofavirtual and/orcloudenvironment. ITConsiderations 1. HowdoestheITOperationsplanaddressthecompany sstrategicandoperationalgoals? 2. Whatmanualprocessesareinplacethatcanbeautomated? 3. WhataretheskillsandcapabilitiesoftheITDepartment? 4. Havetherebeenanypreviousattemptstovirtualizeoroutsourcecriticaloperations? 5. WhichITinitiativescurrentlyunderwaycouldimpacttheFedRAMPsystemboundary? 6. Howisencryptioncurrentlyusedtolimitrisk? 7. Howissensitivedatacurrentlyclassified(i.e.,doyouknowwhereallyourdataresides)? 8. HowhassecurityandcomplianceaffectedITOperations? AssessmentConsiderations 1. Whatpriorexperiencedoestheauditorhavewithvirtual/cloudenvironments(ThirdPartyAssessment Organization(3PAO))? 2. Hasthe3PAOsuccessfullyassessedFedRAMPenvironments? 3. WhatcertificationsdotheyhaveinVMwareproductsorsolutions? 4. HowmanyindividualsthatarepartoftheassessmentteamhaveexperiencewithVMware? 5. Whatthoughtleadershipandguidancehasthe3PAOpublished? 6. Whataretherisksandmitigationtechniquesthe3PAObelievesareappropriateforFedRAMPenvironments? 7. HowlonghavetheybeenworkingwithVMwarearchitectures? 8. Whatreferencesdotheyhaveforconductingsimilarassessments? 9. Isthe3PAOassignedtotheauditengagementcompanyknowledgeableaboutthebasiccomponents,systems, andsoftwareinavmwarecloud? DESIGNGUIDE/ 12

13 VMWAREPRODUCTAPPLICABILITYGUIDEFORFEDRAMP GuidancefromtheFederalRiskAuthorizationManagement Program VMwarehasidentifiedtheFedRAMPcontrolsthathighlightsomeofthecriticalrequirements/guidancethatorganizations arerequiredtoaddressaspartoftheirdeployments.vmwarehasalsoprovidedinformationregardinghowvmwaretools aredesignedtohelporganizationsaddressthesecontrols. CloudcomputingtechnologyallowstheFederalGovernmenttoaddressdemandfromcitizensforbetter,fasterservices andtosaveresources,consolidateservices,andimprovesecurity.theessentialcharacteristicsofcloudcomputing``on` demandprovisioning,resourcepooling,elasticity,networkaccess,andmeasuredservices``providethecapabilitiesfor agenciestodramaticallyreduceprocurementandoperatingcostsandgreatlyincreasetheefficiencyandeffectivenessof services. AgenciescanthenleveragetheProvisionalATOandgranttheirownATOwithoutconductingduplicativeassessments.In priorcloudfismacomplianceprojects,certaincontrolshaveproventobechallengingforserviceproviderstomeet.before youdecidetoinitiatearequesttoparticipateinfedramp,gothroughthechecklistintable3`1link?andmakesurethat youaretrulyabletomeettheserequirements.consultwithyourlegalteamandtechnicalstaff(e.g.systems administrators,databaseadministrators,networkengineersetc.)todetermineifyouhavetherightcontrolsinplaceand havetheabilitytomanagethem. ChecklistforCSPsgettingreadyfortoundergotheFedRAMPprocess 1. Youhavetheabilitytoprocesselectronicdiscoveryandlitigationholds 2. Youhavetheabilitytoclearlydefineanddescribeyoursystemboundaries 3. GuidetoUnderstandingFedRAMP 4. Youcanidentifycustomerresponsibilitiesandwhattheymustdotoimplementcontrols 5. Systemprovidesidentification&2`factorauthenticationfornetworkaccesstoprivilegedaccounts 6. Systemprovidesidentification&2`factorauthenticationfornetworkaccesstonon`privilegedaccounts 7. Systemprovidesidentification&2`factorauthenticationforlocalaccesstoprivilegedaccounts 8. Youcanperformcodeanalysisscansforcodewrittenin`house(non`COTSproducts) 9. Youhaveboundaryprotectionswithlogicalandphysicalisolationofassets 10. Youhavetheabilitytoremediatehighriskissueswithin30days,mediumriskwithin90days 11. Youcanprovideaninventoryandconfigurationbuildstandardsforalldevices 12. Systemhassafeguardstopreventunauthorizedinformationtransferviasharedresources 13. Cryptographicsafeguardspreserveconfidentialityandintegrityofdataduringtransmission DESIGNGUIDE/ 13

14 VMWAREPRODUCTAPPLICABILITYGUIDEFORFEDRAMP VMwareproductsandFedRAMP VMwareprovidesanextensivesuiteofproductsdesignedtohelporganizationssupportsecurityandcomplianceneeds. Whileeveryenvironmenthasuniqueneeds,thefollowingFedRAMPComplianceStackprovidesacomprehensivemixof VMwaresolutionswithfeaturesthataredesignedtoassistwithFedRAMPcompliance.Thesolutions functionality, features,andspecificnist800`53rev3andfedrampbaselinecontrolsv1.1requirementsareaddressedindetailinthe followingsections. VMWAREPRODUCTS ProductComponentsorFeatures vcloudsuite5.5 vsphereincludng: ESXi,vShieldEndpoint,vCenter,vCenterUpdateManager,vCenterOrchestrator, vmotion,storagevmotion,highavailability,dataprotectionandreplication,host Profiles vclouddirectorincluding: ElasticVirtualDatacenters,Multi`TenancyandServiceCatalog vcloudnetworkingandsecurity Suite5.5 Edge,AppFirewall,VXLAN,andDataSecurity vcenteroperationsmanagement Suite5.8 VMwarevCenterOperationsManager,VMware vcenterconfigurationmanager,vmwarevfabric Hyperic, VMwarevCenterInfrastructureNavigator,andVMwarevCenterChargeback Manager NSX6.0 LogicalSwitching,LogicalRouting,LogicalFirewall,VXLAN,NSX6.0EdgeGateway (LoadBalancing,DHCP,VPN),NSX6.0API TodeterminetheproductsandfeaturesavailablewithVMwareSuitespleaserefertoVMware.com: vcloudsuite5.5vcloudnetworkingandsecuritysuite5.5,vcenteroperationsmanagementsuite6.0,nsx6.0 DESIGNGUIDE/ 14

15 VMWAREPRODUCTAPPLICABILITYGUIDEFORFEDRAMP Figure6:VMwareProductsSuiteNeedaNewGraphicherewithNSXcouldbeaFigure7withNSX DESIGNGUIDE/ 15

16 VMWAREPRODUCTAPPLICABILITYGUIDEFORFEDRAMP VMwareFedRAMPRequirementsMatrix(Overview) VMwarehascreatedaFedRAMPRequirementsMatrixtoassistorganizationswithanunderstandingofVMwaresolutions, VMwarePartnersolutions(wheretheyoverlap),andtheremainingcustomerresponsibilitiesthatmustbeaddressed separatelybythecustomerthroughuseofothertoolsorprocesses.whileeverycloudisunique,vmwarebelievesthatthe vastmajorityofnist800`53rev3andfedrampbaselinecontrolsv1.1requirementscanbeaddressedthroughthe VMwareSuitesand/orVMwarepartnersolutions. ThefollowingdiagramshowsanexampleofacloudenvironmentthathasbeendeployedusingtheVMwareFedRAMP suitesandvmwarepartnerproducts. TheremaininggapsinaddressingFedRAMPrequirementsmaybefilledbythecustomerthroughothertools(i.e. approvingcustomers policies,keepinganupdatednetworkdiagram,approvingchanges,etc.) Figure7:FedRAMPRequirementsandVMwareSameasFigure1?NeedNISTCAPSgraphic DESIGNGUIDE/ 16

17 VMWAREPRODUCTAPPLICABILITYGUIDEFORFEDRAMP Table2:NIST800B53Rev3andFedRAMPBaselineControlsv1.1Requirements PIE CHART NIST800B 53REV3ANDFEDRAMP BASELINECONTROLSV1.1 REQUIREMENT AccessControl AwarenessandTraining #OF FEDRAMP ASSESSMENT TESTS TESTS ADDRESSED IN VMWARES SUITES?? AuditandAccountability SecurityAssessmentandAuthorization ConfigurationManagement ContingencyPlanning IdentificationandAuthentication IncidentResponse Maintenance MediaProtection PhysicalandEnvironmentalProtection Planning PersonnelSecurity RiskAssessment SystemandServicesAcquisition SystemandCommunicationProtection SystemandInformationIntegrity TOTAL Note:Controltotalsdonotaddupto298 duetooverlappingfeaturesofvmware productsandpartnerproducts DESIGNGUIDE/ 17

18 VMWAREPRODUCTAPPLICABILITYGUIDEFORFEDRAMP DESIGNGUIDE/ 18 FedRAMPRequirementsMatrix(ByVMwareSuite) vcloudsuite5.5 ForthepurposesoftheVMwareApplicabilityGuideforFedRAMP,thevCloudSuite5.5includesvSphere(ESXi,vCenter Server),vCenterOrchestrator,vCenterUpdateManagerandvCloudDirector.vSphereprovidesthefoundationofthe virtualarchitectureallowingfortheoptimizationofitassets.vclouddirectorextendsthefoundationofthevspherevirtual architecturebyenablingorganizationstobuildsecurecloudsandoptimizingsecurityandcomplianceinprivate,multi` tenant,mixed`mode,andhybridclouds.asvcloudleveragesthevspherearchitecture,thevspherecomponentsintegrate tocreateasinglevcloudthatcanbeoptimizedforsecurityandcomplianceconsiderations.whileitencompassesmany featuresforstorage,businesscontinuity,andautomationnforthepurposesofthisfedrampreferencearchitecture,the criticalcomponentsthatapplytofedrampforvcloudincludethefollowingsixcomponents ESXiHosts,vShield Endpoint,vCenterServer,vCenterOrchestrator,vCenterUpdateManagerandvCloudDirector. ESXi ESXiisatype1hypervisor(baremetal)thatissignificantlydifferentthantheESXarchitecture andoffersimprovementsinsecurity.theesxikernelhasasmallfootprint,noserviceconsoleandcan limitcommunicationtovcenteraccessonly.thisfedrampreferencearchitectureisonlyapplicableto ESXiarchitecturesbecausetheESXiarchitectureandtheESXarchitecturesarequitedifferent. vshieldendpointbwithintegrationofother3rdpartyendpointsolutions(suchasanti`virus),vshield Endpointimprovestheperformancebyoffloadingkeyantivirusandanti`malwarefunctionstoasecured virtualmachineandeliminatingtheantivirusagentfootprintandoverheadinvirtualmachines. vcenterserver vcenterserverisaserver(virtualorphysical)thatprovidesunifiedmanagementfor theentirevirtualinfrastructureandunlocksmanykeyvspherecapabilities.vcenterservercanmanage thousandsofvirtualmachinesacrossmultiplelocationsandstreamlinesadministrationwithfeatures suchasrapidprovisioningandautomatedpolicyenforcement. vcenterorchestrator(vco) vcoisavirtualappliancethatautomatestasksforvmwarevsphereand enablesorchestrationbetweenmultiplesolutions.vmwarevcenterorchestratorallowsadministratorsto automaticallycreateworkflowsthatcapturebestpracticesandmanualworkflowsandcreates automated,repeatablesolutions. vcenterupdatemanager(vum) vumautomatestracking,patchingandupdatingforvspherehosts (ESXihostsandclusters),VMtools,andVMwarevirtualappliances.Itprovidesacentralized,automated, actionablepatchcompliancemanagementsolutiontoconfirmthatallvmwarecomponentsareupdated andtoenforcethelatestsecuritypatches. vclouddirector(vcd)`vcdpoolsdatacenterresourcesincludingcompute,storageandnetwork, alongwiththeirrelevantpoliciesintovirtualdatacenters.fullyencapsulatedmulti`tiervirtualmachine servicesaredeliveredasvapps,usingtheopenvirtualizationformat(ovf).endusersandtheir associatedpoliciesarecapturedinorganizations.withprogrammaticandpolicy`basedpoolingof infrastructure,usersandservices,vmwarevclouddirectorenforcespolicies,whichenablefedramp datatobesecurelyprotected,andnewvirtualmachinesandapplicationstobesecurelyprovisionedand maintained. ThefollowingproductmatrixexplainswhichFedRAMPcontrolsareapplicabletovCloudSuite5.5.Italsoexplainshow vcloudsuiteenablesuserstomeetfedramprequirements.thecontrolshighlightedinboldarethosethathavebeen selectedforthefedrampbaseline.

19 VMWAREPRODUCTAVAILABILITY GUIDEFORFEDRAMP Table3:ApplicabilityofFedRAMPControlstovCloudSuite5.5 NIST800M 53REV3ANDFEDRAMPBASELINECONTROLSV1.1V2.0APPLICABILITYMATRIX NIST800M 53CONTROL FAMILY CONTROLS ADDRESSED VCLOUDSUITE5.5 DESCRIPTION AccessControl AC$5,AC$6, ThevCloudSuite5.5canbeconfiguredtolimitaccesstotheCustomerenvironmentsthroughavarietyof ways.byprovidingacentralizedinterface,vsphereclientandvcenterserverscanreducethecustomer environmentsbyminimizingthenetworkmanagementandlimitingaccesstocriticalcomponentsinthe Customerenvironments.Forexample,thevSphereenvironmentallowsuserstolockdowneachESXi serversothatitcanonlybeaccessedviathevcenterserver.vcocanalsobeusedtoautomateand enforcestandardizedrules,accounts,profiles,andsecuritysettingsinorderthatscopeisnotimpactedas newmachinesaredynamicallyaddedorremoved. Additionally,directaccesstocomponentscanbereduced(suchaslock$downmode)tominimizetherisk ofanydirectconsoleorshellaccess.integratingintovspherecomponentssuchasvum,cloudsusingthe vclouddirectorenvironmentcanbeusedtopushoutcriticalsecurityupdatestoallowthelatestsecurity configurationstobeenforced.hardeningguidelineshavebeendevelopedspecificallyforthecloud environment. vcloudandvspherehavebuiltinaccesscontrolsystemsinplacesothateachvirtualcomponentcanonly beaccessedbyauthorizedusers.systemscanbeaccesseddirectlywithlocalaccounts,orcanbe managedcentrallythrougharolebasedaccesscontrolsystemsenforcedbyvsphereandintegratedinto centralizedaccesscontrolsystem. AllaccesstovirtualdeviceswithinthevCloudandvSphereenvironmentcanenforceindividualaccess. Minimumusernamesandpasswordrequirementscanbesetonmanysystemsnatively(suchastheESXi host).othervirtualcomponentscanbeconfiguredtousecentralizedauthenticationservers(suchas ActiveDirectory)whichcanenforceadditionalcontrolsforpasswordrotation,lockout,durationetc. AuditandAccountability AU$2,AU$3,AU$6(1), AU$8,AU$12, vcloudandvspherehastheabilitytologaccesstocomponentswithintheenvironment.individualaccess tocomponentscanbetracked,logged,andenforced.audittrailscancaptureevent,time,action,and othercriticalrequirementsthatarerequiredformonitoring.logscanbecentrallyconsolidated,reviewed, andretainedforanalysis.allsystemscanbeconfiguredwithtimesynchronization,normallybyenforcing primaryandsecondaryntpserversinthecloudenvironment. Systemand Communications Protection SC$4,SC$6,SC$7,SC$ 30 ThevCenterOrchestrator(vCO)canbeusedtoconfigurenewvirtualcomponentstocommunicateonly withintheenvironmentinwhichtheywereintended.vcocanreducethemanualconfigurationprocesses whicharepronetousererrorandmisconfigurationinalarge,dynamicenvironment.

20 VMWAREPRODUCTAVAILABILITY GUIDEFORFEDRAMP vcloudnetworkingandsecuritysuite5.5 ForthepurposesoftheVMwareApplicabilityGuideforFedRAMP,thesuiteisagroupofproductsthatdeliveravirtualized securitymodelspecificallydesignedtoovercomethetraditionalchallengesofmanagingsecurityinavirtualenvironment. vcloudnetworkingandsecurityprovidesasoftwarebasedapproachtoapplicationanddatasecurityinvirtualandcloud environments,whichhavetraditionallybeenenforcedprimarilythroughphysicalsecurityappliances.thevcloud NetworkingandSecuritySuite5.5consistsofthefollowingfive(5)products: AppFirewall? ProtectsapplicationsinavirtualdatacenteragainstnetworkJbasedthreatsbyprovidingafirewallthatis hypervisorjbasedandapplicationjaware.vcloudnetworkingandsecurityapphasvisibilityofintrajvm communication,andenforcespolicies,firewallrulesbasedonlogicalgroups,andworkloads. DataLeakPrevention AddstoSensitiveDataDiscoveryacrossvirtualizedresourcesallowingtheorganizationstoidentifyand securedifferenttypesofsensitivedata.forfedramp,itprovidesawaytosearchforcardholderdata andtoidentifyhostsandunauthorizedstoresofdata. EdgeGateway Enhancesprotectionofavirtualdatacenterperimeterbyprovidinggatewaysecurityservicesincluding carefulinspectionfirewall,sitejtojsitevpn,loadbalancing,dynamichostconfigurationprotocol (DHCP),andNetworkAddressTranslation(NAT).ItalsohastheabilitytointegratewiththirdJpartyIDS solutions. Manager Managerisamanagementapplication,whichincludesallvCloudNetworkingandSecurityproducts. ManageristightlyintegratedwithvCenterandthebroaderVMwaremanagementportfolio. ThefollowingproductmatrixexplainswhichFedRAMPcontrolsareapplicabletothevCloudNetworkingandSecuritySuite 5.5.ItalsoexplainshowvCloudNetworkingandSecurityassistsusersinmeetingFedRAMPrequirements.Thecontrols highlightedinboldarethosethathavebeenselectedforthefedrampbaseline.

21 VMWAREAPPLICATIBILITY GUIDE 21 VMware,Inc.3401HillviewAvenuePaloAltoCA94304USATel877:486:9273Fax650:427:5001www.vmware.com Copyright 2011VMware,Inc.Allrightsreserved.ThisproductisprotectedbyU.S.andinternationalcopyrightandintellectualpropertylaws.VMwareproductsarecoveredbyoneormorepatentslistedathttp:// intheunitedstatesand/orotherjurisdictions.allothermarksandnamesmentionedhereinmaybetrademarksoftheirrespectivecompanies. VMWAREPRODUCTAVAILABILITY GUIDEFORFEDRAMP Table4:NIST800:53Rev3andFedRAMPBaselineControlsv1.1v2.0ApplicabilityMatrix NIST800: 53REV3ANDFEDRAMPBASELINECONTROLSV1.1V2.0APPLICABILITYMATRIX NIST800: 53CONTROL FAMILY CONTROLSADDRESSED VCNSSUITEDESCRIPTION AccessControl ACI05,ACI6 vcloudnetworkingandsecurityhasbuiltinaccesscontrolsystemsinplacesothateach virtualcomponentcanonlybeaccessedbyauthorizedusers.systemscanbeaccessed directlywithlocalaccounts,orcanbemanagedcentrallythrougharolebasedaccesscontrol systemsenforcedbyvsphereandintegratedintocentralizedaccesscontrolsystem. vcloudnetworkingandsecuritysupportsauthenticationbasedonjobclassificationand function(rbac),andcanbeconfiguredtorequirethatonlytheappropriateadministrators andsupportpersonnelhaveaccesstovcloudnetworkingandsecuritycomponentsand operations.managerprovidesacentralizedsolutiontomanageandenforcesecurityprofiles acrossalargedistributedenvironment. Auditand Accountability AUI2,AUI3,AU:6(1),AUI8, AUI12 vcloudnetworkingandsecurityappandedgegatewayhavetheabilitytologaccessto componentswithinthevirtualenvironmentusingsyslog.individualaccesstocomponents canbetracked,logged,andenforced.audittrailscancaptureevent,time,action,andother criticalrequirementsrequiredformonitoring.logscanbecentrallyconsolidated,reviewed, andretainedforanalysis.allsystemscanbeconfiguredwithtimesynchronization,normally byenforcingprimaryandsecondaryntpserversinthevsphereenvironment. Systemand Communications Protection SCI4,SCI6,SCI7,SCI 7(3)(4)(5)(6)(7)(8)(12)(13)(18), SCI8,SCI8(1),SCI11,SCI13, SCI13(1),SCI30,SCI32 vcloudnetworkingandsecuritymanagerprovidescentralizedmanagementandcanbeused toenforcetheapprovalprocessforchangestonetworkconnections.edgegatewayandapp cancontrolhowcardholderdataflowsoveranetwork,anddataleakpreventioncanbeused tomonitorthatthosecontrolsareoperatingeffectively.rolesandresponsibilitiesfor managementcanbeenforcedanddefinedinmanagerandintegratedintootherrbac solutions.edgegatewaycanbeusedasafirewalltoseparatewirelessnetworksfromthe virtualinfrastructure.bothedgegatewayandappperformstatefulinspection(dynamic filtering).appandedgegatewayalsosupportcommentfields,whichcanusedtodocument thejustificationforeveryopenportandservice.managercanbeusedtoviewcurrent configurationsandallowanadministratortocompareittoanapprovedconfiguration\this facilitatesconfirmationthatrunningconfigurationsfilesforappandedgegatewayare securedandmatchtheapprovedconfigurations. vcloudnetworkingandsecuritycanprovidesegmentationforcloudenvironmentsby segmentingvirtualmachines,portgroups,andenforcingperimetersecurity.edgegateway providesgatewaysecurityservicesincludingastatefulinspectionfirewall,whichprotectsthe networkfromtrafficintoandoutofthevirtualizedinfrastructure.appprovidesvisibilityand controlforintraivmcommunication.dataleakpreventioncanbeusedtoproactivelysearch andidentifystoresofcreditcarddataandgatherdatatovalidateorenforcesegmentation.

22 VMWAREPRODUCTAVAILABILITY GUIDEFORFEDRAMP vcenteroperationsmanagementsuite5.8 ForthepurposeoftheVMwareApplicabilityGuideforFedRAMP,the vcenteroperationsmanagementsuite6.0 includes vcenteroperationsmanager,vcenterconfigurationmanager,vcenterinfrastructure,andvcenterinfrastructure Navigator.ThevCenterOperationsManagementSuite6.0enablesITorganizationstogainbettervisibilityandactionable intelligencetoproactivelyfacilitateservicelevels,optimumresourceusage,andconfigurationcomplianceindynamic virtualandcloudenvironments. vcenteroperationsmanager(vcops) Usespatentedanalyticsandintegratedapproachto operationsmanagementinordertoprovidetheintelligenceandvisibilityrequiredtoproactivelymaintain servicelevels,optimumresourceusage,andconfigurationcomplianceindynamicvirtualandcloud environments. vcenterconfigurationmanager(vcm) Automatesconfigurationmanagementacrossvirtualand physicalserversanddesktops,increasingefficiencybyeliminatingmanual,errorwprone,andtimew consumingwork.thisenablesenterprisestomaintaincontinuouscompliancebydetectingchangesand comparingthemtoconfigurationandsecuritypolicies. DescriptionofvCenterInfrastructure? vcenterinfrastructurenavigator Automaticallydiscoversandvisualizesapplicationand infrastructuredependencies.itprovidesvisibilityintotheapplicationservicesrunningoverthevirtualw machineinfrastructureandtheirinterrelationshipsfordaywtowdayoperationalmanagement. ThefollowingproductmatrixexplainswhichFedRAMPcontrolsareapplicabletothevCenterOperationsManagement (vcops)suite.thefollowingisthedetaileddescriptionofthecontrolsthatmaybemetthroughthesuite.thecontrols highlightedinboldarethosethathavebeenselectedforthefedrampbaseline. WeneedtomakesurethereisvCOpsvCloudConnectorcontentformappingofvCloudLayerstovAppsaswellas InfrastructureNavigatorcapabilitiestomaptheapplicationsoftware " VMWAREAPPLICATIBILITY GUIDE 22 VMware,Inc.3401HillviewAvenuePaloAltoCA94304USATel877:486:9273Fax650:427:5001www.vmware.com Copyright 2011VMware,Inc.Allrightsreserved.ThisproductisprotectedbyU.S.andinternationalcopyrightandintellectualpropertylaws.VMwareproductsarecoveredbyoneormorepatentslistedat companies.

23 VMWAREPRODUCTAVAILABILITY GUIDEFORFEDRAMP Table5:NIST800:53Rev3andFedRAMPBaselineControlsv1.1v2.0ApplicabilityMatrix NIST800: 53REV3ANDFEDRAMPBASELINECONTROLSV1.1V2.0APPLICABILITYMATRIX NIST800: 53CONTROL FAMILY CONTROLS ADDRESSED DESCRIPTION AccessControl ACI5,ACI6 AccesstovCOPscanbecontrolledthroughMicrosoftActiveDirectory.ThiswillallowvCOPstohelpthe usermeetthefedramprequirementsforaccesscontroltothecustomerenvironment. AuditandAccountability AUI2,AUI3,AU:6(1), AUI8,AUI12 vcopshastheabilitytomonitoraccesscontrolstothecustomerenvironmentandtherebymonitor compliancewithfedramprequirements.specifically,vcopswillassessandreportonthefollowing: # LocalanddomainIlevelusers(Windows)anduserswithuniqueusernames(UNIX,Linuxand MACOS). # Systempasswordpoliciesforexpiration,length,standards,creationsettings,accessattempts, (canalsoremediate) # Changestouseraccounts,credentialstores,andidentifierobjectstoprovidevisibilityand controloversystemaccess # Useraccessacrossallthesystemsinthedatacenteratonce # Disableandremoveaccessforterminateduseraccounts # Inactiveaccounts(whichitcanalsodisableandremoveaccessfortheseuseraccounts) # Thestatusofmaintenanceaccountsandtoconfirmthattheyaredisabledandconfiguredto onlybeusedduringthetimesspecified. # Loginpolicies,toincludelockoutsettingsandautoIlogoutsettings,andremediatingasneeded. Assessment,reportingandremediationareconductedinaccordancewithschedulingthrough vcops. vcopswillassess,reportandremediatethefollowing: # Configurationsofthesystemauditingandloggingservicestosupportproperloggingacross systemcomponents. # vcmcollectsauditlogentriestoprovideasingleviewofevents. # Useraccessaudittrailsbyensuringproperpermissionsforlogfilesandtheirdirectoriesand alertonchangestocriticalaudittrails. vcopshastheabilitytotracksystemchangesacrossthousandsofdatapointsand,inconjunctionwith nativeauditing,canbeusedtotrackaccountactivityandsystemmodifications. vcopscanassessandreportonsyslogconfigurationdetailsonunixandlinuxsystemsthatspecify remotelogserverswithinthenetwork. vcopscanbealsousedtoassess,report,andremediateauditloggingforvmwarecomponentsand guestoperatingsystems. ChangeswithinthevirtualenvironmentarecapturedbyvCOPsandcanbedisplayedinvCM.vCMcan VMWAREAPPLICATIBILITY GUIDE 23 VMware,Inc.3401HillviewAvenuePaloAltoCA94304USATel877:486:9273Fax650:427:5001www.vmware.com Copyright 2011VMware,Inc.Allrightsreserved.ThisproductisprotectedbyU.S.andinternationalcopyrightandintellectualpropertylaws.VMwareproductsarecoveredbyoneormorepatentslistedathttp:// intheunitedstatesand/orotherjurisdictions.allothermarksandnamesmentionedhereinmaybetrademarksoftheirrespectivecompanies.

24 VMWARESOLUTIONGUIDE 24 VMware,Inc.3401HillviewAvenuePaloAltoCA94304USATel877:486:9273Fax650:427:5001www.vmware.com Copyright 2011VMware,Inc.Allrightsreserved.ThisproductisprotectedbyU.S.andinternationalcopyrightandintellectualpropertylaws.VMwareproductsarecoveredbyoneormorepatentslistedathttp:// intheunitedstatesand/orotherjurisdictions.allothermarksandnamesmentionedhereinmaybetrademarksoftheirrespectivecompanies. VMWAREPRODUCTAVAILABILITY GUIDEFORFEDRAMP NIST800: 53REV3ANDFEDRAMPBASELINECONTROLSV1.1V2.0APPLICABILITYMATRIX NIST800: 53CONTROL FAMILY CONTROLS ADDRESSED DESCRIPTION collectauditlogentrieswithinanorganizationvdctoallowanorganizationasingleviewofeventswithin theirenvironment.vcmisalsoabletocontroluseraccesstoaudittrailswithinanorganizationby providingproperpermissionsforlogfilesandtheirdirectories. Configuration Management CMI2,CM:2(1)(3)(5), CMI3,CMI4(2),CMI5, CM:5(1)(2)(6),CMI6, CM:6(1)(3),CMI7, CMI7(1)(3),CMI8, CM:8(1)(3)(5) Securityhardeningandtheenforcementofconfigurationstandardsaredifficultinanyenvironmentand havehistoricallyreliedonmanualprocesses.thevcopssuitehastheabilitytoassessbothphysical andvirtualmachinesinthecloudcomputingarchitectureandreporttheircompliancewithavarietyof configurationconcerns.vcopshastheabilitytoconsistentlycheckthecompliancestatusofmachines withintheenvironmentcriticalfortheconfigurationmanagementandhardeningofsystems.itemssuch asdefaultsystemsettings,systemsecurityhardeningandbaseilining,uniprovisionandunapproved softwareorservices,andreportunnecessaryfunctionsfromsystems.vcopsallowsthecustomerto customizeanynumberofcompliancetemplatescreatedtomeetregulatoryandbestpracticesstandards including,butnotlimitedtocis,isoi27001/27002,sansandnist.thisfunctionwillallowforthe simplebaselineofstandardsandsecurityconfiguration. vcopswithvcmisabletoassess,download,anddeploypatchestowindows,unix,linux,andmac operatingsystems.assessmentsarecustomizableandcanbesettoverifycriticalpatchesinthepast 30days. ChangeswithinthevirtualenvironmentarecapturedbyvCOPsandcanbedisplayedinvCM.Each changemadetotheconfigurationsettingsisdocumentedandlogged.ifachangeismadewithoutthe properapprovalitisalertedwithasimplerollbackprocedureandthechangeisreversed.vcopsare abletotrackchangesbothmadethroughthestandardchangeprocessoroutofbandchanges conducteddirectlyonthevmsorthroughanothertool. vcmconfiguredtousethe VMwarevCloud5.5HardeningGuide templatetoreportonconfiguration settingsinthevirtualenvironment,aswellasthereportingresultsforacleanscanoftheenvironment withallappropriateconfigurationscorrectlyapplied. SystemandInformation Integrity SII2,SII3,SII 3(1)(2)(3),SII4,SII 4(2)(4)(5),SI:6,SII7, SII7(1) vcopscanperformfileintegritymonitoring(fim)withinthecloudcomputingarchitectureforcritical filesand/ordirectories.alertscanalsobeestablishedtoalertpersonnelofanychangesmadeor attemptedandevenremediateasneeded. vcopsdoesnothaveabuiltinantiivirussolution,butitcanbeusedtoassesandreporttheantiivirus stateofthesystems.thisallowsadeterminationthatallsystemshaveantiivirussoftwareinstalledand runningwiththeupdatedsignaturefiles.vcopscanremediateantiivirusproblemsbyinstallingthe customerapprovedantiivirussoftwareonsystemswhereitisnotinstalledstarting/enablingthesoftware services.

25 VMWAREAPPLICATIBILITY GUIDE 25 VMware,Inc.3401HillviewAvenuePaloAltoCA94304USATel877:486:9273Fax650:427:5001www.vmware.com Copyright 2011VMware,Inc.Allrightsreserved.ThisproductisprotectedbyU.S.andinternationalcopyrightandintellectualpropertylaws.VMwareproductsarecoveredbyoneormorepatentslistedathttp:// intheunitedstatesand/orotherjurisdictions.allothermarksandnamesmentionedhereinmaybetrademarksoftheirrespectivecompanies. VMWAREPRODUCTAVAILABILITY GUIDEFORFEDRAMP VMwareNSXSuite6.0Needinformationclarifyingfeaturesvs.products.ShouldServiceComposerbelisted? ForthepurposesoftheVMwareApplicabilityGuideforFedRAMP,theNSX6.0suiteofproductsincludesLogicalSwitching,LogicalRouting,LogicalFirewall, LogicalLoadBalancer,NSX6.0API,NSX6.0Gateway,andLogicalVPN.TheVMwarenetworkvirtualizationsolutionaddressescurrentchallengeswithphysical networkinfrastructureandbringsflexibility,agilityandscalethroughvxlanibasedlogicalnetworks.alongwiththeabilitytocreateonidemandlogicalnetworks usingvxlan,thevcloudnetworkingandsecurityedgegatewayhelpsusersdeployvariouslogicalnetworkservicessuchasfirewall,dhcp,natandload balancingonthesenetworks.thisispossibleduetoitsabilitytodecouplethevirtualnetworkfromthephysicalnetworkandthenreproducethepropertiesand servicesinthevirtualenvironment. LogicalSwitching ThelogicalswitchingcapabilityintheNSX6.0platformprovidescustomerstheabilitytospinupisolatedlogicalL2networkswiththesame flexibilityandagility,asitistospinupvirtualmachines.therearethreemaincomponentsthathelpdecoupletheunderlinephysicalnetwork fabricandprovidenetworkabstraction,nsx6.0manager,controllercluster,userworldagentandvxlantunnelendpoint. LogicalRouting TherearetwomodesofroutingsupportedintheNSX6.0platformDistributedRoutingandCentralizedRouting.Thedistributedrouting capabilityinthensx6.0platformprovidesanoptimizedandscalablewayofhandlingeastiwesttrafficwithinadatacenter.therearemultiple componentsforthelogicalroutingdnsx6.0manager,logicalroutercontrolvm,logicalrouterkernelmodule,controllercluster,nsx6.0 EdgeServicesRouter,RoutingDeployments,PhysicalRouterasNextHop,EdgeServicesasNextHop,andaScalableTopology. LogicalFirewall TheVMwareNSX6.0platformincludesdistributedkernelenabledfirewallingwithlinerateperformance,virtualizationandidentityawarewith activitymonitoring,amongothernetworksecurityfeaturesnativetonetworkvirtualizationsuchasnetworkisolationandsegmentation. LogicalLoadBalancer Thisserviceoffersdistributionworkloadacrossmultipleservers,aswellashighIavailabilityofapplications.TheNSX6.0loadbalancingservice isspeciallydesignedforcloudwithfullyprogrammableviaapiandsamesinglecentralpointofmanagement/monitoringasothernsx6.0 networkservices. NSX6.0API TheAPIinterfaceoftheNSX6.0managerhelpsautomatedeploymentandmanagementoflogicalroutersandswitchesthroughaCloud managementplatform. NSX6.0Gateway ThegatewayisavirtualappliancethatperformsLogicalroutingfunctions.NSX6.0Edgeservicesrouterprovidesthetraditionalcentralized routingsupportinthensx6.0platform.alongwiththeroutingservicesnsx6.0edgealsosupportsothernetworkservicesthatincludedhcp, NAT,Loadbalancingetc. ThefollowingproductmatrixexplainswhichFedRAMPcontrolsareapplicabletotheNSXSuite6.0.ItalsoexplainshowNSXSuiteassistsusersinmeeting FedRAMPrequirements.ThecontrolshighlightedinBoldarethosethathavebeenselectedfortheFedRAMPBaseline.

26 VMWARESOLUTIONGUIDE 26 VMware,Inc.3401HillviewAvenuePaloAltoCA94304USATel877:486:9273Fax650:427:5001www.vmware.com Copyright 2011VMware,Inc.Allrightsreserved.ThisproductisprotectedbyU.S.andinternationalcopyrightandintellectualpropertylaws.VMwareproductsarecoveredbyoneormorepatentslistedathttp:// intheunitedstatesand/orotherjurisdictions.allothermarksandnamesmentionedhereinmaybetrademarksoftheirrespectivecompanies. VMWAREPRODUCTAVAILABILITY GUIDEFORFEDRAMP Table6:NIST800:53Rev3andFedRAMPBaselineControlsv1.1v2.0ApplicabilityMatrixNeedMoreServiceComposer NIST800: 53REV3ANDFEDRAMPBASELINECONTROLSV1.1V2.0APPLICABILITYMATRIX NIST800: 53CONTROL FAMILY CONTROLS ADDRESSED VMWARENSX6.0 DESCRIPTION AccessControl ACI04 VMwareNSX6.0allowsforpreIdefinednetworkrulesandpoliciesenablingmoreeffectiveinformation flowenforcementatthenetworklayer. Configuration Management CMI2,CM:2(1)(3)(5), CMI3,CMI4(2),CMI5, CM:5(1)(2)(6),CMI6, CM:6(1)(3),CMI7, CMI7(1)(3),CMI8, CM:8(1)(3)(5) NSX6.0networkvirtualizationprogrammaticallycreates,snapshots,deletes,andrestoressoftwareI basedvirtualnetworks.thevirtualizationofnetworkingservicesanddevicessuchaslayer2 switching,l3routing,loadbalancingandfirewallservices,allowscloudserviceprovidestocreate compliantbaselineconfigurationsofnetworkingservicesandarchitectureandmaintainthemunder configurationcontrol.thesecanthenbedeployedtofederalagencycustomerswithouttheriskof misconfigurationorlengthyreplicationofeffortinprovisioningnetworkservices. Systemand Communications Protection SCI4,SCI5,SC:6,SCI 7,SC:7(3)(4)(5)(6)( 7)(8)(12)(13)(18),SC: 11,SCI13,SC:13(1), SCI14,SCI19 NetworkvirtualizationthroughNSX6.0allowsforpreIdefinedLayer2toLayer7services.Thisadds anadditionallayerofseparationwithinmultiitenanthostingservicesandmostimportantlyreducesthe riskofmisconfigurationofnetworkservicesandpotentialexposureofsensitiveinformationanddatato unauthorizednetworksorpersonnel. NSX6.0providesLoadBalancingasaservicewithinthenetworkingsuite.Thisserviceenables workloaddistributionacrossphysicalserversaswellasdynamicscalabilityforhighbandwidth. VMwareNSX6.0NetworkVirtualizationsuiteprovidesthefollowingserviceswhichcanbeconfigured tosupportboundaryprotection,networksegmentationandtrustedpatchrequirementsforfederal customers: LogicalLayer2 EnablingextensionofaL2segment/IPSubnetanywhereinthefabric irrespectiveofthephysicalnetworkdesign. DistributedL3Routing RoutingbetweenIPsubnetscanbedoneinalogicalspacewithout trafficgoingouttothephysicalrouter.thisroutingisperformedinthehypervisorkernelwitha minimalcpu/memoryoverhead.thisfunctionalityprovidesanoptimaldataipathforroutingtraffic withinthevirtualinfrastructure.similarlythensx6.0edgeprovidesamechanismtodofulldynamic routepeeringusingospf,bgp,isiiswiththephysicalnetworktoenableseamlessintegration. DistributedFirewall SecurityenforcementisdoneatthekernelandVNIClevelitself.This enablesfirewallruleenforcementinahighlyscalablemannerwithoutcreatingbottlenecksonto physicalappliances.thefirewallisdistributedinkernelandhencehasminimalcpuoverheadand canperformatlineirate. LogicalLoad:balancing SupportforL4IL7loadbalancingwithabilitytodoSSLtermination. SSLVPNservicestoenableL2VPNservices. SystemandInformation Integrity SI:6, VirtualizationofthenetworklayersdevicesandservicesprovidestheabilitytomonitorandenforcepreI definedarchitectureincludingvirtualnetworkdevicesandservices.intheeventofasecurity functionalityfailure,nsx6.0networkvirtualizationprogrammaticallycreates,snapshots,deletes,and restoressoftwareibasedvirtualnetworks.

27 VMWAREPRODUCTAVAILABILITY GUIDEFORFEDRAMP Disclaimer: VMwaresolutionsaredesignedtohelporganizationsaddressvariousregulatorycompliancerequirements.Thisdocumentisintendedtoprovidegeneral guidancefororganizationsthatareconsideringvmwaresolutionstohelpthemaddresssuchrequirements.vmwareencouragesanyorganizationthatis consideringvmwaresolutionstoengageappropriatelegal,business,technical,andauditexpertisewithintheirspecificorganizationforreviewofregulatory compliancerequirements.itistheresponsibilityofeachorganizationtodeterminewhatisrequiredtomeetanyandallrequirements.theinformation containedinthisdocumentisforeducationalandinformationalpurposesonly.thisdocumentisnotintendedtoprovidelegaladviceandisprovided ASIS. VMwaremakesnoclaims,promisesorguaranteesabouttheaccuracy,completeness,oradequacyoftheinformationcontainedherein.Nothingthatyouread inthisdocumentshouldbeusedasasubstitutefortheadviceofcompetentlegalcounsel. Acknowledgements: VMwarewouldliketorecognizetheeffortsoftheVMwareCenterforPolicy&Compliance,VMwarePartnerAlliance,and thenumerousvmwareteamsthatcontributedtothispaperandtotheestablishmentofthevmwarecompliance Program.VMwarewouldalsoliketorecognizetheCoalfireSystemsInc.VMwareTeam guidanceandcontrolinterpretationalignedtonist800u53rev3andfedrampbaselinecontrolsv1.1v.2.0andthe ReferenceArchitecturedescribedherein. The$information$provided$by$Coalfire$Systems$and$contained$in$this$document$is$for$educational$and$informational$ purposes$only.$coalfire$systems$makes$no$claims,$promises$or$guarantees$about$the$accuracy,$completeness,$or$ adequacy$of$the$information$contained$herein.$ AboutCoalfire CoalfireSystemsisaleading,independentinformationtechnologyGovernance,RiskandCompliance(ITGRC)firmthat providesitaudit,riskassessmentandcompliancemanagementsolutions.foundedin2001,coalfire hasofficesin Dallas,Denver,LosAngeles,NewYork,SanFrancisco,SeattleandWashington,D.C.,andcompletesthousandsof projectsannuallyinretail,financialservices,healthcare,governmentandutilities.coalfire hasdevelopedanew generationofcloudubaseditgrctoolsunderthenavis brandthatclientsusetoefficientlymanageitcontrolsandkeep pacewithrapidlychangingregulationsandbestpractices.coalfire ssolutionsareadaptedtorequirementsunderemerging dataprivacylegislation,thenist800u53rev3andfedrampbaselinecontrolsv1.1,glba,ffiec,hipaa/hitech, NERCCIP,SarbanesUOxleyandFISMA.Formoreinformation,visitwww.coalfire.com. # # VMWAREAPPLICATIBILITY GUIDE 27 VMware,Inc.3401HillviewAvenuePaloAltoCA94304USATel877:486:9273Fax650:427:5001www.vmware.com Copyright 2011VMware,Inc.Allrightsreserved.ThisproductisprotectedbyU.S.andinternationalcopyrightandintellectualpropertylaws.VMwareproductsarecoveredbyoneormorepatentslistedat companies.

VMware!SDDC!Product! Applicability!Guide!for!CJIS! v5.2!

VMware!SDDC!Product! Applicability!Guide!for!CJIS! v5.2! VMwareSDDCProduct ApplicabilityGuideforCJIS v5.2 August2014 v1.0 Product Guide This is the first document in the Compliance Reference Architecture for CJIS. You can find more information on the Framework

More information

Security Compliance In a Post-ACA World

Security Compliance In a Post-ACA World 1 Security Compliance In a Post-ACA World Security Compliance in a Post-ACA World Discussion of building a security compliance framework as part of an ACA Health Insurance Exchange implementation. Further

More information

Looking at the SANS 20 Critical Security Controls

Looking at the SANS 20 Critical Security Controls Looking at the SANS 20 Critical Security Controls Mapping the SANS 20 to NIST 800-53 to ISO 27002 by Brad C. Johnson The SANS 20 Overview SANS has created the 20 Critical Security Controls as a way of

More information

IT Security Management Risk Analysis and Controls

IT Security Management Risk Analysis and Controls IT Security Management Risk Analysis and Controls Steven Gordon Document No: Revision 770 3 December 2013 1 Introduction This document summarises several steps of an IT security risk analysis and subsequent

More information

System Security Certification and Accreditation (C&A) Framework

System Security Certification and Accreditation (C&A) Framework System Security Certification and Accreditation (C&A) Framework Dave Dickinson, IOAT ISSO Chris Tillison, RPMS ISSO Indian Health Service 5300 Homestead Road, NE Albuquerque, NM 87110 (505) 248-4500 fax:

More information

Security Controls Assessment for Federal Information Systems

Security Controls Assessment for Federal Information Systems Security Controls Assessment for Federal Information Systems Census Software Process Improvement Program September 11, 2008 Kevin Stine Computer Security Division National Institute of Standards and Technology

More information

VMware 'SDDC'Product' Applicability'Guide'for' HIPAA/HITECH,'v1.0 '

VMware 'SDDC'Product' Applicability'Guide'for' HIPAA/HITECH,'v1.0 ' VMware SDDCProduct ApplicabilityGuidefor HIPAA/HITECH,v1.0 November2013 TECHNICALGUIDE This is the first document in the Compliance Reference Architecture for HIPAA. You can find more information on the

More information

CTR System Report - 2008 FISMA

CTR System Report - 2008 FISMA CTR System Report - 2008 FISMA February 27, 2009 TABLE of CONTENTS BACKGROUND AND OBJECTIVES... 5 BACKGROUND... 5 OBJECTIVES... 6 Classes and Families of Security Controls... 6 Control Classes... 7 Control

More information

Altius IT Policy Collection Compliance and Standards Matrix

Altius IT Policy Collection Compliance and Standards Matrix Governance IT Governance Policy Mergers and Acquisitions Policy Terms and Definitions Policy 164.308 12.4 12.5 EDM01 EDM02 EDM03 Information Security Privacy Policy Securing Information Systems Policy

More information

Get Confidence in Mission Security with IV&V Information Assurance

Get Confidence in Mission Security with IV&V Information Assurance Get Confidence in Mission Security with IV&V Information Assurance September 10, 2014 Threat Landscape Regulatory Framework Life-cycles IV&V Rigor and Independence Threat Landscape Continuously evolving

More information

NIST 800-53A: Guide for Assessing the Security Controls in Federal Information Systems. Samuel R. Ashmore Margarita Castillo Barry Gavrich

NIST 800-53A: Guide for Assessing the Security Controls in Federal Information Systems. Samuel R. Ashmore Margarita Castillo Barry Gavrich NIST 800-53A: Guide for Assessing the Security Controls in Federal Information Systems Samuel R. Ashmore Margarita Castillo Barry Gavrich CS589 Information & Risk Management New Mexico Tech Spring 2007

More information

Bellingham Control System Cyber Security Case Study

Bellingham Control System Cyber Security Case Study Bellingham Control System Cyber Security Case Study Marshall Abrams Joe Weiss Presented at at 2007 Annual Computer Security Applications Conference Case Study Synopsis Examine actual control system cyber

More information

5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE

5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE 5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE 5 FAH-11 H-510 GENERAL (Office of Origin: IRM/IA) 5 FAH-11 H-511 INTRODUCTION 5 FAH-11 H-511.1 Purpose a. This subchapter implements the policy

More information

CMS POLICY FOR THE INFORMATION SECURITY PROGRAM

CMS POLICY FOR THE INFORMATION SECURITY PROGRAM Chief Information Officer Office of Information Services Centers for Medicare & Medicaid Services CMS POLICY FOR THE INFORMATION SECURITY PROGRAM FINAL Version 4.0 August 31, 2010 Document Number: CMS-CIO-POL-SEC02-04.0

More information

ASIA/PAC AERONAUTICAL TELECOMMUNICATION NETWORK SECURITY GUIDANCE DOCUMENT

ASIA/PAC AERONAUTICAL TELECOMMUNICATION NETWORK SECURITY GUIDANCE DOCUMENT INTERNATIONAL CIVIL AVIATION ORGANIZATION ASIA AND PACIFIC OFFICE ASIA/PAC AERONAUTICAL TELECOMMUNICATION NETWORK SECURITY GUIDANCE DOCUMENT DRAFT Second Edition June 2010 3.4H - 1 TABLE OF CONTENTS 1.

More information

CONTINUOUS MONITORING

CONTINUOUS MONITORING CONTINUOUS MONITORING Monitoring Strategy Part 2 of 3 ABSTRACT This white paper is Part 2 in a three-part series of white papers on the sometimes daunting subject of continuous monitoring (CM) and how

More information

Security and Privacy Controls for Federal Information Systems and Organizations

Security and Privacy Controls for Federal Information Systems and Organizations NIST Special Publication 800-53 Revision 4 Security and Privacy Controls for Federal Information Systems JOINT TASK FORCE TRANSFORMATION INITIATIVE This document contains excerpts from NIST Special Publication

More information

HHS Information System Security Controls Catalog V 1.0

HHS Information System Security Controls Catalog V 1.0 Information System Security s Catalog V 1.0 Table of Contents DOCUMENT HISTORY... 3 1. Purpose... 4 2. Security s Scope... 4 3. Security s Compliance... 4 4. Security s Catalog Ownership... 4 5. Security

More information

Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org

Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org Promoting Application Security within Federal Government AppSec DC November 13, 2009 Dr. Sarbari Gupta, CISSP, CISA Founder/President Electrosoft [email protected] 703-437-9451 ext 12 The Foundation

More information

Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org

Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org Promoting Application Security within Federal Government AppSec DC November 13, 2009 Dr. Sarbari Gupta, CISSP, CISA Founder/President Electrosoft [email protected] 703-437-9451 ext 12 The Foundation

More information

VMware!Product!Applicability!Guide!for!! Payment!Card!Industry!Data!Security!Standard!

VMware!Product!Applicability!Guide!for!! Payment!Card!Industry!Data!Security!Standard! VMwareProductApplicabilityGuidefor PaymentCardIndustryDataSecurityStandard (PCIDSS)version3.0 February2014 V3.0 DESIGNDOCUMENT This is the first document in the Compliance Reference Architecture For PCI.

More information

VMware!EUC!Product!Applicability!Guide! for!payment!card!industry!data!security! Standard!(PCI!DSS)!version!3.0!

VMware!EUC!Product!Applicability!Guide! for!payment!card!industry!data!security! Standard!(PCI!DSS)!version!3.0! VMware EUCProductApplicabilityGuide forpaymentcardindustrydatasecurity Standard(PCIDSS)version3.0 July2015 v1.0 TECHNICALWHITEPAPER ThisisthefirstdocumentintheComplianceReferenceArchitectureforPCI.You

More information

COORDINATION DRAFT. FISCAM to NIST Special Publication 800-53 Revision 4. Title / Description (Critical Element)

COORDINATION DRAFT. FISCAM to NIST Special Publication 800-53 Revision 4. Title / Description (Critical Element) FISCAM FISCAM 3.1 Security (SM) Critical Element SM-1: Establish a SM-1.1.1 The security management program is adequately An agency/entitywide security management program has been developed, An agency/entitywide

More information

FISMA: Securing National Infrastructure

FISMA: Securing National Infrastructure FISMA: Securing National Infrastructure Using a Holistic Approach to Lower Total Cost of Ownership (TCO) of FISMA Compliance by 50% or More an eiqnetworks White Paper by John Linkous Security and Compliance

More information

Security Self-Assessment Tool

Security Self-Assessment Tool Security Self-Assessment Tool State Agencies Receiving FPLS Information, 7/15/2015 Contents Overview... 2 Access Control (AC)... 3 Awareness and Training (AT)... 8 Audit and Accountability (AU)... 10 Security

More information

FedRAMP Master Acronym List. Version 1.0

FedRAMP Master Acronym List. Version 1.0 FedRAMP Master Acronym List Version 1.0 September 10, 2015 Revision History Date Version Page(s) Description Author Sept. 10, 2014 1.0 All Initial issue. FedRAMP PMO How to Contact Us For questions about

More information

The Cloud in Regulatory Affairs - Validation, Risk Management and Chances -

The Cloud in Regulatory Affairs - Validation, Risk Management and Chances - 45 min Webinar: November 14th, 2014 The Cloud in Regulatory Affairs - Validation, Risk Management and Chances - www.cunesoft.com Rainer Schwarz Cunesoft Holger Spalt ivigilance 2014 Cunesoft GmbH PART

More information

Government of Canada Managed Security Services (GCMSS) Appendix D: Security Control Catalogue ITSG-33 - Annex 3 DRAFT 3.1

Government of Canada Managed Security Services (GCMSS) Appendix D: Security Control Catalogue ITSG-33 - Annex 3 DRAFT 3.1 Government of Canada Managed Security Services (GCMSS) Appendix D: Security Control Catalogue ITSG-33 - Annex 3 DRAFT 3.1 Date: June 15, 2012 Information Technology Security Guidance Guide to Managing

More information

Cloud Security for Federal Agencies

Cloud Security for Federal Agencies Experience the commitment ISSUE BRIEF Rev. April 2014 Cloud Security for Federal Agencies This paper helps federal agency executives evaluate security and privacy features when choosing a cloud service

More information

CMS SYSTEM SECURITY PLAN (SSP) PROCEDURE

CMS SYSTEM SECURITY PLAN (SSP) PROCEDURE Chief Information Officer Office of Information Services Centers for Medicare & Medicaid Services CMS SYSTEM SECURITY PLAN (SSP) PROCEDURE August 31, 2010 Version 1.1 - FINAL Summary of Changes in SSP

More information

Security Language for IT Acquisition Efforts CIO-IT Security-09-48

Security Language for IT Acquisition Efforts CIO-IT Security-09-48 Security Language for IT Acquisition Efforts CIO-IT Security-09-48 Office of the Senior Agency Information Security Officer VERSION HISTORY/CHANGE RECORD Change Number Person Posting Change Change Reason

More information

Industrial Security Field Operations

Industrial Security Field Operations Defense Security Service Industrial Security Field Operations NISP Authorization Office (NAO) (Formerly Office of the Designated Approving Authority) NISPOM to NIST (800-53r4) Security Control Mapping

More information

Proposed Security Assessment & Authorization for U.S. Government Cloud Computing

Proposed Security Assessment & Authorization for U.S. Government Cloud Computing Proposed Security Assessment & Authorization for U.S. Government Cloud Computing Draft version 0.96 November 2, 2010 Preface Proposed Security Assessment and Authorization for U.S. Government Cloud Computing:

More information

Understanding HITRUST s Approach to Risk vs. Compliance-based Information Protection

Understanding HITRUST s Approach to Risk vs. Compliance-based Information Protection Understanding Compliance vs. Risk-based Information Protection 1 Understanding HITRUST s Approach to Risk vs. Compliance-based Information Protection Why risk analysis is crucial to HIPAA compliance and

More information

Minimum Security Requirements for Federal Information and Information Systems

Minimum Security Requirements for Federal Information and Information Systems FIPS PUB 200 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Minimum Security Requirements for Federal Information and Information Systems Computer Security Division Information Technology Laboratory

More information

AF Life Cycle Management Center

AF Life Cycle Management Center AF Life Cycle Management Center Avionics Weapon Systems Cybersecurity Risk Management Framework Assessment & Authorization Update Harrell Van Norman AFLCMC/EZAS Cybersecurity Technical Expert [email protected]

More information

Compliance Overview: FISMA / NIST SP800 53

Compliance Overview: FISMA / NIST SP800 53 Compliance Overview: FISMA / NIST SP800 53 FISMA / NIST SP800 53: Compliance Overview With Huntsman SIEM The US Federal Information Security Management Act (FISMA) is now a key element of the US Government

More information

COMMONWEALTH OF VIRGINIA

COMMONWEALTH OF VIRGINIA COMMONWEALTH OF VIRGINIA Information Technology Resource Management Information Security Standard Virginia Information Technologies Agency (VITA) Page i ITRM Publication Version Control ITRM Publication

More information

U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL

U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT: U.S. Election Assistance Commission Compliance with the Requirements of the Federal Information Security Management Act Fiscal

More information

VIRGINIA DEPARTMENT OF MOTOR VEHICLES IT SECURITY POLICY. Version 2.

VIRGINIA DEPARTMENT OF MOTOR VEHICLES IT SECURITY POLICY. Version 2. VIRGINIA DEPARTMENT OF MOTOR VEHICLES IT SECURITY POLICY Version 2., 2012 Revision History Version Date Purpose of Revision 2.0 Base Document 2.1 07/23/2012 Draft 1 Given to ISO for Review 2.2 08/15/2012

More information

Security Control Standard

Security Control Standard Department of the Interior Security Control Standard Security Assessment and Authorization January 2012 Version: 1.2 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior,

More information

Requirements For Computer Security

Requirements For Computer Security Requirements For Computer Security FTA/IRS Safeguards Symposium & FTA/IRS Computer Security Conference April 2, 2008 St. Louis 1 Agenda Security Framework Safeguards IT Security Review Process Preparing

More information

Deriving Software Security Measures from Information Security Standards of Practice

Deriving Software Security Measures from Information Security Standards of Practice Deriving Software Measures from Standards of Practice Julia Allen Christopher Alberts Robert Stoddard February 2012 2012 Carnegie Mellon University Copyright 2012 Carnegie Mellon University. This material

More information

WRITTEN INFORMATION SECURITY PROGRAM (WISP) ACME Consulting Services, Inc.

WRITTEN INFORMATION SECURITY PROGRAM (WISP) ACME Consulting Services, Inc. WRITTEN INFORMATION SECURITY PROGRAM (WISP) ACME Consulting Services, Inc. Copyright 2016 Table of Contents WRITTEN INFORMATION SECURITY PROGRAM (WISP) OVERVIEW 10 INTRODUCTION 10 PURPOSE 10 SCOPE & APPLICABILITY

More information

Chapter One: Cloud Computing Security Requirements Baseline

Chapter One: Cloud Computing Security Requirements Baseline Chapter One: Cloud Computing Security Requirements Baseline Page 1 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118

More information

ACA System Security Plan Procedures

ACA System Security Plan Procedures Centers for Medicare & Medicaid Services Table of Contents 1. INTRODUCTION... 4 1.1 OVER VI EW... 4 1.2 P URP O SE... 5 1.3 SSP/SPR Template Instructions... 6 1.4 EXECUTIVE SUMMARY... 6 2 SYSTEM IDENTIF

More information

INFORMATION TECHNOLOGY SECURITY POLICY 60-702. Table of Contents

INFORMATION TECHNOLOGY SECURITY POLICY 60-702. Table of Contents Department of Commerce National Oceanic & Atmospheric Administration National Weather Service NATIONAL WEATHER SERVICE INSTRUCTION 60-702 December 21, 2009 Information Technology INFORMATION TECHNOLOGY

More information

CRR-NIST CSF Crosswalk 1

CRR-NIST CSF Crosswalk 1 IDENTIFY (ID) Asset Management (AM): The data, personnel, devices, systems, and facilities that enable the organization to achieve business purposes are identified and managed consistent with their relative

More information

Privacy Impact Assessment

Privacy Impact Assessment For: Great Lakes Computer System (GLCS) Great Lakes Educational Loan Services, Inc. (GOALS) Date: June 18, 2013 Point of Contact: Gregory Plenty (202) 377-3253 [email protected] System Owner: Keith

More information

FINAL Version 2.0 September 20, 2013

FINAL Version 2.0 September 20, 2013 CENTERS for MEDICARE & MEDICAID SERVICES Enterprise Information Security Group 7500 Security Boulevard Baltimore, Maryland 21244-1850 Standard: CMS Information Security, CMS Minimum Security Requirements

More information

CMS Master Security Plan

CMS Master Security Plan Office of the Chief Information Security Officer Centers for Medicare & Medicaid Services 7500 Security Boulevard Baltimore, Maryland 21244-1850 CMS Master Security Plan FINAL Version 6.00 June 25, 2010

More information

Security Control Standards Catalog

Security Control Standards Catalog Security Control Standards Catalog Version 1.2 Texas Department of Information Resources April 3, 2015 Contents About the Security Control Standards Catalog... 1 Document Life Cycle... 1 Revision History...

More information

Publication 4812. Contractor Security Controls. ***This Publication Pertains to IT Assets Owned and Managed at Contractor Sites***

Publication 4812. Contractor Security Controls. ***This Publication Pertains to IT Assets Owned and Managed at Contractor Sites*** Information Technology CYBERSECURITY Publication 4812 Handling and Protecting Information or Information Systems ***This Publication Pertains to IT Assets Owned and Managed at Contractor Sites*** Publicationn

More information

FISMA NIST 800-53 (Rev 4) Shared Public Cloud Infrastructure Standards

FISMA NIST 800-53 (Rev 4) Shared Public Cloud Infrastructure Standards FISMA NIST 800-53 (Rev 4) Shared Public Cloud Infrastructure Standards NIST CONTROL CLOUDCHECKR SUPPORT ACTIVITY AC-2 ACCOUNT MANAGEMENT Control: The organization: a. Identifies and selects the following

More information

IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector

IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector V.2 Final Draft May 1, 2014 [email protected] This revision incorporates comments from the public. Page Use case 1 Comments

More information

Federal Highway Administration (FHWA) Cybersecurity Program (CSP) Handbook

Federal Highway Administration (FHWA) Cybersecurity Program (CSP) Handbook For Official Use Only Version 1 Federal Highway Administration (FHWA) Cybersecurity Program (CSP) Handbook OFFICE OF INFORMATION TECHNOLOGY SERVICES Information Technology Strategic Objective APRIL 2014

More information

Written Information Security Program (WISP)

Written Information Security Program (WISP) Your Logo Will Be Placed Here Written Information Security Program (WISP) ACME Consulting, LLC Copyright 2014 Table of Contents WRITTEN INFORMATION SECURITY PROGRAM (WISP) OVERVIEW 10 INTRODUCTION 10 PURPOSE

More information

Publication 4812. Contractor Security Controls

Publication 4812. Contractor Security Controls Publication 4812 Handling and Protecting Information or Information Systems ***This Publication Pertains to IT Assets Owned and Managed at Contractor Sites*** July 2014 Highlights of Publication 4812

More information

A Taxonomy of Operational Cyber Security Risks

A Taxonomy of Operational Cyber Security Risks A Taxonomy of Operational Cyber Security Risks James J. Cebula Lisa R. Young December 2010 TECHNICAL NOTE CMU/SEI-2010-TN-028 CERT Program Unlimited distribution subject to the copyright. http://www.sei.cmu.edu

More information

Complying with the Federal Information Security Management Act. Parallels with Sarbanes-Oxley Compliance

Complying with the Federal Information Security Management Act. Parallels with Sarbanes-Oxley Compliance WHITE paper Complying with the Federal Information Security Management Act How Tripwire Change Auditing Solutions Help page 2 page 3 page 3 page 3 page 4 page 4 page 5 page 5 page 6 page 6 page 7 Introduction

More information

Security Features in Password Manager

Security Features in Password Manager Security Features in Written by Einar Mykletun, Ph.D. security and compliance architect for research and development at Dell Introduction Information system security is a priority for every organization,

More information

Cybersecurity Throughout DoD Acquisition

Cybersecurity Throughout DoD Acquisition Cybersecurity Throughout DoD Acquisition Tim Denman Cybersecurity Performance Learning Director DAU Learning Capabilities Integration Center [email protected] [email protected] Cybersecurity

More information

Critical Review/Technology Assessment (CR/TA) November 2014. Cloud Computing for the Government Sector

Critical Review/Technology Assessment (CR/TA) November 2014. Cloud Computing for the Government Sector Critical Review/Technology Assessment (CR/TA) November 2014 Cloud Computing for the Government Sector 1 Cyber Security and Information Systems Information Analysis Center (CSIAC) Assured Information Security

More information

Selecting RMF Controls for National Security Systems

Selecting RMF Controls for National Security Systems SANDIA REPORT SAND2015-6770 Unlimited Release Printed August 2015 Selecting RMF Controls for National Security Systems Edward L. Witzke Prepared by Sandia National Laboratories Albuquerque, New Mexico

More information

FISMA NIST 800-53 (Rev 4) Audit and Accountability: Shared Public Cloud Infrastructure Standards

FISMA NIST 800-53 (Rev 4) Audit and Accountability: Shared Public Cloud Infrastructure Standards FISMA NIST 800-53 (Rev 4) Audit and Accountability: Shared Public Cloud Infrastructure Standards Standard Requirement per NIST 800-53 (Rev. 4) CloudCheckr Action AU-3/ AU3(1) AU-3 CONTENT OF AUDIT RECORDS

More information

HyTrust Addendum to the VMware Product Applicability Guide. For. Federal Risk and Authorization Management Program (FedRAMP) version 1.

HyTrust Addendum to the VMware Product Applicability Guide. For. Federal Risk and Authorization Management Program (FedRAMP) version 1. HyTrust Product Applicability Guide For Federal Risk and Authorization Management Program (FedRAMP) VMware Compliance Reference Architecture Framework to the VMware Product Applicability Guide For Federal

More information

Security Guide for ActiveRoles Server 6.1

Security Guide for ActiveRoles Server 6.1 Security Guide for ActiveRoles Server 6.1 Written by Einar Mykletun, Ph.D Security and Compliance Architect Quest Software, Inc. Technical Brief 2009 Quest Software, Inc. ALL RIGHTS RESERVED. This document

More information

DIVISION OF INFORMATION SECURITY (DIS)

DIVISION OF INFORMATION SECURITY (DIS) DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Information Systems Acquisitions, Development, and Maintenance v1.0 October 15, 2013 Revision History Update this table every time a new

More information

Security Control Standard

Security Control Standard Department of the Interior Security Control Standard Risk Assessment January 2012 Version: 1.2 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior, Chief Information

More information

Security Control Standard

Security Control Standard Department of the Interior Security Control Standard Maintenance January 2012 Version: 1.2 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior, Chief Information Officer

More information

QTS Leverages HyTrust to Build a FedRAMP Compliant Cloud

QTS Leverages HyTrust to Build a FedRAMP Compliant Cloud CASE STUD QTS Leverages HyTrust to Build a FedRAMP Compliant Cloud The technology and expertise provided by HyTrust dramatically simplified the process of preparing for our FedRAMP certification. HyTrust

More information

A Draft List of Software Assurance (SwA) Related NIST SP 800-53 Revision 4 Controls*

A Draft List of Software Assurance (SwA) Related NIST SP 800-53 Revision 4 Controls* !!!!!!!!!!!!! A Draft List of Software Assurance (SwA) Related NIST SP 800-53 Revision 4 Controls* Technical Report: UNO-TGRS-20131121-1 Robin Gandhi, Harvey Siy, Sayonnha Mandal The University of Nebraska

More information

Publication 1075 Tax Information Security Guidelines For Federal, State and Local Agencies

Publication 1075 Tax Information Security Guidelines For Federal, State and Local Agencies Publication 1075 Tax Information Security Guidelines For Federal, State and Local Agencies Safeguards for Protecting Federal Tax Returns and Return Information IRS Mission Statement Provide America s taxpayers

More information

Tim Denman Systems Engineering and Technology Dept Chair/ Cybersecurity Lead DAU South, Huntsville [email protected]

Tim Denman Systems Engineering and Technology Dept Chair/ Cybersecurity Lead DAU South, Huntsville Tim.Denman@dau.mil Tim Denman Systems Engineering and Technology Dept Chair/ Cybersecurity Lead DAU South, Huntsville [email protected] Current State of Cybersecurity in the DoD Current Needs Communications focus Changing

More information

FISMA / NIST 800-53 REVISION 3 COMPLIANCE

FISMA / NIST 800-53 REVISION 3 COMPLIANCE Mandated by the Federal Information Security Management Act (FISMA) of 2002, the National Institute of Standards and Technology (NIST) created special publication 800-53 to provide guidelines on security

More information

Security Control Standard

Security Control Standard Department of the Interior Security Control Standard Program Management April 2011 Version: 1.1 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior, Chief Information

More information

Improving Critical Infrastructure Cybersecurity Executive Order 13636. Preliminary Cybersecurity Framework

Improving Critical Infrastructure Cybersecurity Executive Order 13636. Preliminary Cybersecurity Framework 1 Improving Critical Infrastructure Cybersecurity Executive Order 13636 Preliminary Cybersecurity Framework 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35

More information

IT Security and Compliance Program Plan for Maxistar Medical Supplies Company

IT Security and Compliance Program Plan for Maxistar Medical Supplies Company IT Security and Compliance Program Plan for Maxistar Medical Supplies Company IT Security and Compliance Program Plan for Maxistar Medical Supplies Company IT Security and Compliance Program for PCI, HIPAA

More information

DEPARTMENT OF DEFENSE (DoD) CLOUD COMPUTING SECURITY REQUIREMENTS GUIDE (SRG) Version 1, Release 1. 12 January 2015

DEPARTMENT OF DEFENSE (DoD) CLOUD COMPUTING SECURITY REQUIREMENTS GUIDE (SRG) Version 1, Release 1. 12 January 2015 DEPARTMENT OF DEFENSE (DoD) CLOUD COMPUTING SECURITY REQUIREMENTS GUIDE (SRG) Version 1, Release 1 12 January 2015 Developed by the Defense Information Systems Agency (DISA) for the Department of Defense

More information

Expert Systems with Applications

Expert Systems with Applications Expert Systems with Applications 39 (2012) 247 257 Contents lists available at ScienceDirect Expert Systems with Applications journal homepage: www.elsevier.com/locate/eswa A hybrid information security

More information

Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program

Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program U.S. ENVIRONMENTAL PROTECTION AGENCY OFFICE OF INSPECTOR GENERAL Information Technology Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program Report.

More information

Ernie Hayden CISSP CEH GICSP Executive Consultant www.securicon.com

Ernie Hayden CISSP CEH GICSP Executive Consultant www.securicon.com Ernie Hayden CISSP CEH GICSP Executive Consultant www.securicon.com V1 10-7-14 This Presentation is Proprietary to Securicon, Inc. Any use of this document without express written approval from Securicon

More information

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy IT Risk Strategy V0.1 April 21, 2014

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy IT Risk Strategy V0.1 April 21, 2014 DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy IT Risk Strategy V0.1 April 21, 2014 Revision History Update this table every time a new edition of the document is published Date Authored

More information

NIST 800-53 Accelerator Automated Real-Time Controls to Protect Against Cyberattacks & Insider Threats

NIST 800-53 Accelerator Automated Real-Time Controls to Protect Against Cyberattacks & Insider Threats NIST 800-53 Accelerator Automated Real-Time Controls to Protect Against Cyberattacks & Insider Threats Highlights Full suite of database security applications: Automate & simplify NIST 800-53 controls

More information

How To Cloud Compute At The Cloud At The Cyclone Center For Cnc

How To Cloud Compute At The Cloud At The Cyclone Center For Cnc Cloud Computing at CDC Current Status and Future Plans Earl Baum March, 2014 1 Background Current Activities Agenda Use Cases, Shared Services and Other Considerations What s Next 2 Background Cloud Definition

More information

Leveraging Microsoft Privileged Identity Management Features for Compliance with ISO 27001, PCI, and FedRAMP

Leveraging Microsoft Privileged Identity Management Features for Compliance with ISO 27001, PCI, and FedRAMP P a g e 1 Leveraging Microsoft Privileged Identity Management Features for Compliance with ISO 27001, PCI, and FedRAMP December 24, 2015 Coalfire Systems, Inc. www.coalfire.com 206-352- 6028 w w w. c o

More information

Continuous Monitoring Strategy & Guide

Continuous Monitoring Strategy & Guide Version 1.1 July 27, 2012 Executive Summary The OMB memorandum M-10-15, issued on April 21, 2010, changed from static point in time security authorization processes to Ongoing Assessment and Authorization

More information

Malicious Control System Cyber Security Attack Case Study Maroochy Water Services, Australia

Malicious Control System Cyber Security Attack Case Study Maroochy Water Services, Australia Malicious Control System Cyber Security Attack Case Study Maroochy Water Services, Australia Marshall D. Abrams, The MITRE Corporation Joe Weiss, Applied Control Solutions, LLC Annual Computer Security

More information

Complying with National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53 An Assessment of Cyber-Ark's Solutions

Complying with National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53 An Assessment of Cyber-Ark's Solutions Complying with National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53 An Assessment of Cyber-Ark's Solutions z September 2011 Table of Contents EXECUTIVE SUMMARY... 3 CYBER-ARK

More information

SOFTWARE ASSET MANAGEMENT

SOFTWARE ASSET MANAGEMENT BUILDING BLOCK WHITE PAPER SOFTWARE ASSET MANAGEMENT Continuous Monitoring V.2 This revision incorporates comments from the public. David Waltermire Information Technology Laboratory [email protected]

More information

VMware s)approach)to)compliance))

VMware s)approach)to)compliance)) VMware sapproachtocompliance UpdatedJuly2015 V2.1 VMware sapproachtocompliance TableofContents 1. INTRODUCTION...3 2. SECURITY,COMPLIANCE,ANDGUIDELINES...5 3. AVIEWOFVMWARE SCOMPLIANCESOLUTIONS...7 4.

More information

Sample CDC Certification and Accreditation Checklist For an Application That Is Considered a Moderate Threat

Sample CDC Certification and Accreditation Checklist For an Application That Is Considered a Moderate Threat Sample CDC Certification and Accreditation Checklist For an Application That Is Considered a Moderate Threat Centers for Disease and Prevention National Center for Chronic Disease Prevention and Health

More information

Overview of NetFlow NetFlow and ITSG-33 Existing Monitoring Tools Network Monitoring and Visibility Challenges Technology of the future Q&A

Overview of NetFlow NetFlow and ITSG-33 Existing Monitoring Tools Network Monitoring and Visibility Challenges Technology of the future Q&A Overview of NetFlow NetFlow and ITSG-33 Existing Monitoring Tools Network Monitoring and Visibility Challenges Technology of the future Q&A What is NetFlow? Network protocol originally developed by Cisco

More information

FEDERAL HOUSING FINANCE AGENCY OFFICE OF INSPECTOR GENERAL

FEDERAL HOUSING FINANCE AGENCY OFFICE OF INSPECTOR GENERAL FEDERAL HOUSING FINANCE AGENCY OFFICE OF INSPECTOR GENERAL Clifton Gunderson LLP s Independent Audit of the Federal Housing Finance Agency s Information Security Program - 2011 Audit Report: AUD-2011-002

More information

Fall June S o f t w a r e I m p r o v e m e n t G r o u p ( S I G )

Fall June S o f t w a r e I m p r o v e m e n t G r o u p ( S I G ) June 2014 4 A lightweight, flexible evaluation framework to measure the ISO 27002 information security controls Karin Huijben Master Computing Science Radboud University, Nijmegen, The Netherlands Software

More information

Report of Evaluation OFFICE OF INSPECTOR GENERAL. OIG 2014 Evaluation of the Farm Credit OIG 2014 Administration s. Management Act.

Report of Evaluation OFFICE OF INSPECTOR GENERAL. OIG 2014 Evaluation of the Farm Credit OIG 2014 Administration s. Management Act. OFFICE OF INSPECTOR GENERAL Report of Evaluation OIG 2014 Evaluation of the Farm Credit OIG 2014 Administration s Evaluation of the Farm Compliance Credit Administration s with the Federal Information

More information